A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2006; you can also visit the original URL.
The file type is application/pdf
.
Automated and certified conformance to responsiveness policies
2005
Proceedings of the 2005 ACM SIGPLAN international workshop on Types in languages design and implementation - TLDI '05
Certified code systems protect computers from faulty or malicious code by requiring untrusted software to be accompanied by checkable evidence of its safety. This paper presents a certified code solution to a problem in grid computing, namely, controlling the CPU usage of untrusted programs. Specifically, we propose to endow the runtime system supervising local execution of grid programs with a trusted "yield" operation, and require the untrusted code to execute this operation with at least a
doi:10.1145/1040294.1040302
dblp:conf/tldi/VanderwaartC05
fatcat:yqmm2dzzbzc5hlogb4rkfxof2y