Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Reflects downloads up to 16 Oct 2024Bibliometrics
Skip Table Of Content Section
research-article
Open Access
A programming model for concurrent object-oriented programs
Article No.: 1, Pages 1–48https://doi.org/10.1145/1452044.1452045

Reasoning about multithreaded object-oriented programs is difficult, due to the nonlocal nature of object aliasing and data races. We propose a programming regime (or programming model) that rules out data races, and enables local reasoning in the ...

research-article
Open Access
Efficient constraint propagation engines
Article No.: 2, Pages 1–43https://doi.org/10.1145/1452044.1452046

This article presents a model and implementation techniques for speeding up constraint propagation. Three fundamental approaches to improving constraint propagation based on propagators as implementations of constraints are explored: keeping track of ...

research-article
Open Access
Decomposing bytecode verification by abstract interpretation
Article No.: 3, Pages 1–63https://doi.org/10.1145/1452044.1452047

Bytecode verification is a key point in the security chain of the Java platform. This feature is only optional in many embedded devices since the memory requirements of the verification process are too high. In this article we propose an approach that ...

research-article
Open Access
A probabilistic language based on sampling functions
Article No.: 4, Pages 1–46https://doi.org/10.1145/1452044.1452048

As probabilistic computations play an increasing role in solving various problems, researchers have designed probabilistic languages which treat probability distributions as primitive datatypes. Most probabilistic languages, however, focus only on ...

research-article
Open Access
Verified interoperable implementations of security protocols
Article No.: 5, Pages 1–61https://doi.org/10.1145/1452044.1452049

We present an architecture and tools for verifying implementations of security protocols. Our implementations can run with both concrete and symbolic implementations of cryptographic algorithms. The concrete implementation is for production and ...

Subjects

Comments