A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Flexible Bytecode for Linking in .NET
2005
Electronical Notes in Theoretical Computer Science
We describe the scheme's integration with the .NET linking infrastructure, review important design decisions and report on experiences with the "Rotor" shared source version of .NET. ...
We have designed and implemented a "flexible" dynamic linking scheme that binds bytecode as late as possible to the assemblies and classes available in a .NET execution environment. ...
Acknowledgements We thank the Imperial SLURP group for helpful discussions, and the anonymous reviewers for their comments. ...
doi:10.1016/j.entcs.2005.02.036
fatcat:mmyq6q64sjfjvfzg7kyrqwi27a
NASA space safety standards and procedures for human-rating requirements
[chapter]
2010
Space Safety Regulations and Standards
The National Aeronautics and Space Administration of the United States of America (NASA) has arguably led this planet in space exploration and certainly has been one of two major leaders in those endeavors ...
While NASA documents are the source of information presented herein, any and all views expressed herein and any misrepresentations of NASA data that may occur herein are those of the author and should ...
pads, and communication systems. ...
doi:10.1016/b978-1-85617-752-8.10001-7
fatcat:ecsxrdlf2vcc7lwy2at4uzepri
Dancing with Giants: Wimpy Kernels for On-Demand Isolated I/O
2014
2014 IEEE Symposium on Security and Privacy
Thus, they cannot include a variety of basic services available only in large and untrustworthy commodity systems; i.e., in giants. ...
Using the USB subsystem as a case study, this paper illustrates the dramatic reduction of wimpy-kernel size and complexity; e.g., over 99% of the USB code base is removed. ...
of the device-specific ones. ...
doi:10.1109/sp.2014.27
dblp:conf/sp/ZhouYG14
fatcat:6hof2a5kwndg3gy2v7ndsnmsli
Advanced eGovernment Information Service Bus (eGov-Bus)
2007
Informatică economică
Requirements and specific rules of these life events are considered, and personalization of user preferences is supported. eGov-Bus is based on adaptable process management technologies, allowing for virtual ...
The eGov-Bus project provides citizens and businesses with improved access to virtual public services, which are based on existing national eGovernment Web services and which support cross-border life ...
the technical scope of the prototype based on the analysis of documents, in particular those from tasks WP3 to WP7, and also verification by competent persons of the validity of projections for volume ...
doaj:5481b77e057e4ab3b400020fac9f6ddd
fatcat:45fqf2jzfjhgbj6qxef72yqch4
The Role of Coordination Analysis in Software Integration Projects
[chapter]
2011
Lecture Notes in Computer Science
The approach is based on a methodology which enables semi-automatic discovery of coordination patterns from source code, combining generalized slicing techniques and graph manipulation. ...
How close are they to the coordination component of the envisaged architectural model which was supposed to guide the integration process? ...
The paper introduces a case study on verification of design time integration strategies. Section 2 sums up the methodology, and examples of its application are discussed in 3. ...
doi:10.1007/978-3-642-25126-9_16
fatcat:xweltzdjyzapvexur4xbdbwc3e
Development Platforms for Mobile Applications: Status and Trends
2011
IEEE Software
Better standardization (for example, fewer optional APIs and more detailed specifications) and stricter enforcement of standards (for example, using API verification initiatives and technology compatibility ...
Issue description
Java ME
.NET CF
Flash Lite
Android
Developer
community and
support*
Extensive
MSDN
Extensive
Recent, growing
Market
penetration*
Extensive (also the basis of the
Danger ...
DAPHNE ECONOMOU is a lecturer in interactive multimedia and hypermedia at the University of the Aegean's Department of Cultural Technology and Communication. ...
doi:10.1109/ms.2010.155
fatcat:ottaolg3f5h3dc5mfwzk77onf4
Report of the HPC Correctness Summit, Jan 25--26, 2017, Washington, DC
[article]
2017
arXiv
pre-print
In this study, we detail one of the most significant productivity challenges in achieving this goal, namely the increasing proclivity to bugs, especially in the face of growing hardware and software heterogeneity ...
We close with the proposal for a two-day workshop in which the problems identified in this report can be more broadly discussed, and specific plans to launch these new research thrusts identified. ...
The complexity of reasoning about numerical code depends on the gap between the specification and the implementation. ...
arXiv:1705.07478v1
fatcat:2rebouk2tvbqhcfthfhz5abd7i
Component technology - what, where, and how?
2003
25th International Conference on Software Engineering, 2003. Proceedings.
In addition, the recent movement towards services, as well as the established world of objects, causes many to wonder what purpose components might have. ...
This extended abstract summarizes the main points of my Frontiers of Software Practice (FOSP) talk at ICSE 2003. ...
This approach enables the use of AsmL for specification and test of code implemented in any language hosted on the CLR. ...
doi:10.1109/icse.2003.1201255
dblp:conf/icse/Szyperski03
fatcat:aerwifjnkvbzffywixqguxsooy
Towards secure wirelessMAN: Revisiting and evaluating authentication in WiMAX
2011
International Conference on Computer Networks and Information Technology
This work intends to establish the formal basis to justify the claims put forth in the specification of ISNAP against PKM vI & v2. ...
We focus on the 1 st and 2n d version of Privacy & Key Management (PKM) Protocols, which are implemented in the WiMAX architecture at present and compare their performance characteristics with another ...
At present, these network specifications are being adopted by major service providers across the globe for deployment of wireless broadband services and last-mile solutions, termed under the name World-wide ...
doi:10.1109/iccnit.2011.6020925
fatcat:z762fsuiizd2rgz7va6zm2dsim
Security Protocol Verification: Symbolic and Computational Models
[chapter]
2012
Lecture Notes in Computer Science
implementations rather than specifications. ...
This paper surveys various approaches in this area, considering the verification in the symbolic model, as well as the more recent approaches that rely on the computational model or that verify protocol ...
We thank Pierpaolo Degano for helpful comments on a draft of this paper. Sect. 2.2 is updated from [48] . This work was partly supported by the ANR project ProSe (decision ANR-2010-VERS-004-01). ...
doi:10.1007/978-3-642-28641-4_2
fatcat:fc32uobfpfbqboiqtfwj3fokee
Comparative Analysis of Quality and Environmental Management Strategic Implementation in Cement Industry
2019
Media Ilmiah Teknik Lingkungan
The author will analyze the comparison of strategies implemented by the three cement industries in implementing ISO 9001: 2015 and ISO 14001: 2015. ...
The cement industry's activities have an impact on health and the environment, therefore a solution is needed to deal with the negative impacts of the cement industry operations. ...
Implemented clear leadership structure Build relationship on the basis mutual respect and trust with all stakeholders in the community Improvement of human resource Health, safety, and community ...
doi:10.33084/mitl.v4i2.1072
fatcat:gdnj5wf4v5dkxdxt4mdb5ik4he
Type-preserving compilation of end-to-end verification of security enforcement
2010
Proceedings of the 2010 ACM SIGPLAN conference on Programming language design and implementation - PLDI '10
and much of our compiler from the trusted computing base (TCB), relying only on the DCIL type checker for bytecode verification and on the .NET virtual machine to faithfully execute the program. ...
This is perhaps indicative of a bias in the SMT solving community to optimize for speed rather than for conciseness of proofs. ...
We thank Trishul Chilimbi, Jeremy Condit, and several anonymous reviewers for their helpful comments on an earlier version of the paper; Shriram Krishnamurthi for providing us with Continue's policy; Nikolaj ...
doi:10.1145/1806596.1806643
dblp:conf/pldi/ChenCS10
fatcat:tkw7hu7vk5htzm4cnohkih6jim
Type-preserving compilation of end-to-end verification of security enforcement
2010
SIGPLAN notices
and much of our compiler from the trusted computing base (TCB), relying only on the DCIL type checker for bytecode verification and on the .NET virtual machine to faithfully execute the program. ...
This is perhaps indicative of a bias in the SMT solving community to optimize for speed rather than for conciseness of proofs. ...
We thank Trishul Chilimbi, Jeremy Condit, and several anonymous reviewers for their helpful comments on an earlier version of the paper; Shriram Krishnamurthi for providing us with Continue's policy; Nikolaj ...
doi:10.1145/1809028.1806643
fatcat:fxmdoanjdbgu3es2cuokpwd3nu
Programming quality improvement in IBM [Technical forum]
1994
IBM Systems Journal
They were generic in nature, rather than laboratory- or product-specific, and could be used to augment any development process. In es- sence they were specific implementations of the principles. ...
Verification can take such forms as: customer advisory coun- cils, making prototypes available for customer use, early support programs, and beta tests. ...
doi:10.1147/sj.331.0215
fatcat:ejbxevf2vvaove7ijmblm4tgru
How Does Customary International Law Change? The Case of State Immunity
2014
International Studies Quarterly
Consequentially, a state's decision to apply a CIL norm should be a function of the extent to which the norm is practiced in the community of states it interacts with rather than the past behavior of the ...
Because the continued existence of CIL depends on state practice, the potential precedential effect of defection encourages cooperation as long as states value the cooperative norm. ...
If states share the belief that a rule is CIL, they should expect other states to apply it on a non-discriminatory basis. This does not mean that states always implement the most cooperative norm. ...
doi:10.1111/isqu.12155
fatcat:fwcsrz5s7bagdclwseaauw4y2u
« Previous
Showing results 1 — 15 out of 522 results