نتایج جستجو برای: run time leakage
تعداد نتایج: 1977427 فیلتر نتایج به سال:
Since the appearance of Java several tools have been developed to allow making dynamic changes in Java programs. In general, these tools trades the flexibility for the efficiency of the program. In this paper I present RtJAC, an aspect-oriented framework for Java based on JAC [3], which makes possible to create aspects, specify their join points and weave them into an application, all at run-ti...
Run-Time Optimization of Adaptive Irregular Applications. (August 2004) Hao Yu, B.S., Tsinghua University, PR China; M.S., Tsinghua University, PR China Chair of Advisory Committee: Dr. Lawrence Rauchwerger Compared to traditional compile-time optimization, run-time optimization could offer significant performance improvements when parallelizing and optimizing adaptive irregular applications, b...
A new method is featured which solves the sofhvare integrity problem by properly coding rather than enciphering. Adopting the lengthy and expensive solution which consists of having the whole program signedlencrypted by an authority would require fiil decryption and secure storage for the whole program before execution, whereas one signed instruction, pipe-lined decoding-executing, and secure r...
In this paper, the SEESCOA component model and its run-time system are presented. In the SEESCOA-project, a component methodology was developed that explicitly models component interaction using the port and connector concepts. Since non-functional constraints are important for embedded systems, they are modelled separately in contracts. Using this component interaction model, SEESCOA allows fo...
Security and trust represent two different perspectives on the problem of guaranteeing the correct interaction among software components. Gate automata have been proposed as a formalism for the specification of both security and trust policies in the scope of the Security-by-Contract-withTrust (S×C×T) framework. Indeed, they watch the execution of a target program, possibly modifying its behavi...
A certifying compiler takes a source language program and produces object code as well as a certi cate that can be used to verify that the object code satis es desirable prop erties such as type safety and memory safety Certifying compilation helps to increase both compiler robustness and program safety Compiler robustness is improved since some compiler errors can be caught by checking the obj...
Current parallelizing compilers cannot identify a signiicant fraction of fully parallel loops because they have complex or statically insuuciently deened access patterns. Since fully parallel loops arise frequently in practice, we have developed methods to speculatively execute loops concurrently. These methods can be applied to any loop, even if the iteration space of the loop is unknown, as i...
We consider the dynamic task allocation problem in multicomputer system with multiprogramming. Programs are given as task interaction graphs that have to be mapped onto the processors at run-time. We propose a fast two-phase heuristic algorithm where phase 1 performs a hierarchic clustering of the tasks which is used by the second phase to map clusters of suitable size onto free partitions of t...
This paper describes the S3MS.NET run time monitor, a tool that can enforce security policies expressed in a variety of policy languages for .NET desktop or mobile applications. The tool consists of two major parts: a bytecode inliner that rewrites .NET assemblies to insert calls to a policy decision point, and a policy compiler that compiles source policies to executable policy decision points...
Software must be constantly adapted due to evolving domain knowledge and unanticipated requirements changes. To adapt a system at run-time we need to reflect on its structure and its behavior. Objectoriented languages introduced reflection to deal with this issue, however, no reflective approach up to now has tried to provide a unified solution to both structural and behavioral reflection. This...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید