Volltext-Artikel, eBooks und vieles mehr aus dem EBSCO Discovery Service

Das Gesuchte nicht gefunden? Schauen Sie in der Onleihe oder machen Sie einen Kaufvorschlag

Treffer 81 - 100 von 167

81

Verified Bytecode Subroutines
G. Klein ; M. Wildmoser ; The Pennsylvania State University CiteSeerX Archives
http://www4.in.tum.de/publ/papers/KleinW-JAR02.pdf.

Java Bytecode Verification Subroutines Theorem Proving Data Flow Analysis Isabelle
Fachzeitschrift
82

A denial of service attack on the Java bytecode verifier
Gal, Andreas ; Probst, Christian W. ; Franz, Michael

Fachzeitschrift
86

Java Proof Linking with Multiple Classloaders
Philip W. L. Fong ; Robert D. Cameron ; The Pennsylvania State University CiteSeerX Archives
http://www.cs.sfu.ca/people/GradStudents/pwfong/personal/Pub/SFU-CMPT-TR-2000-04.ps.

Fachzeitschrift
87

Language-Based Security
Dexter Kozen ; The Pennsylvania State University CiteSeerX Archives
http://www.cs.purdue.edu/homes/palsberg/cs565/F99/kozen99.ps.

Fachzeitschrift
89

Least Types for Memory Locations in Java Bytecode
Zhenyu Qian ; The Pennsylvania State University CiteSeerX Archives
ftp://ftp.cs.williams.edu/pub/kim/FOOL6/qian.ps

Fachzeitschrift
90

Lightweight Bytecode Verification
Eva Rose ; Kristoffer Høgsbro Rose ; The Pennsylvania State University CiteSeerX Archives
http://www-dse.doc.ic.ac.uk/~sue/oopsla/rose.f.ps.

Fachzeitschrift
91

Abstract
Eva Rose ; Kristoffer Høgsbro Rose ; The Pennsylvania State University CiteSeerX Archives
http://ag-kastens.upb.de/wir/taiko/diss/rose98lightweight.pdf.

Fachzeitschrift
93

Computer aided verification: 13th International conference, CAV 2001, Paris, France, July 18-22, 2001 : proceedings
CAV 2001

Comon, Hubert. ; Berry, Gérard, 1948- ; Finkel, A.

Computer software -- Ver... Integrated circuits -- V... Computer science. Logic design. Software engineering. Artificial intelligence.
Buch
94

Computer aided verification: 11th International Conference, CAV'99, Trento, Italy, July 6-10, 1999 : proceedings
CAV'99 : computer aided verification
CAV'99

Halbwachs, Nicolas. ; Peled, Doron, 1962- ; Peled, Doron A., 1962-

Computer software -- Ver... Integrated circuits -- V... Computer science. Logic design. Software engineering. Conference proceedings.
Buch
95

Using postdomination to reduce space requirements of data flow analysis
BERNARDESCHI, CINZIA ; LETTIERI, GIUSEPPE ; MASCI, PAOLO MANUEL ; et al.

Algorithm Data flow analysi Proof system
Fachzeitschrift
96

Average Case vs. Worst Case-Margins of Safety in System Design
Probst, Christian ; Gal, Andreas ; Franz, Michael
Probst , C , Gal , A & Franz , M 2005 , Average Case vs. Worst Case-Margins of Safety in System Design . in New Security Paradigms Workshop . < http://www2.imm.dtu.dk/pubdb/p.php?4149 >

Fachzeitschrift
97

Kleene Algebra and Bytecode Verification
Kot, Lucja ; Kozen, Dexter
eCommons : Open scholarship at Cornell

geo stat
Report
98

Title of thesis: Proof Linking: A Modular Verification Architecture
Philip W. L. Fong ; Simon Fraser University ; The Pennsylvania State University CiteSeerX Archives
http://fas.sfu.ca/pub/cs/TH/2003/PhilipWLFongPhD.pdf.

Fachzeitschrift
100

Kleene Algebra and Bytecode Verification
Kot, Lucja ; Kozen, Dexter

computer science technical report
Report

Filter