Search Results - Concurrent Programming General Terms Security

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    Backwards-directed information flow analysis for concurrent programs by Winter, Kirsten, Coughlin, Nicholas, Smith, Graeme

    ISSN: 2374-8303
    Published: IEEE 01.06.2021
    “…A number of approaches have been developed for analysing information flow in concurrent programs in a compositional manner, i.e…”
    Get full text
    Conference Proceeding
  2. 2

    When Memory Corruption Met Concurrency: Vulnerabilities in Concurrent Programs by Llorente-Vazquez, Oscar, Santos-Grueiro, Igor, Bringas, Pablo Garcia

    ISSN: 2169-3536, 2169-3536
    Published: Piscataway IEEE 01.01.2023
    Published in IEEE access (01.01.2023)
    “…Concurrent programs are widespread in modern systems. They make better use of processor resources but inevitably introduce a new set of problems in terms of reliability and security…”
    Get full text
    Journal Article
  3. 3

    GT-NRSM: efficient and scalable sharding consensus mechanism for consortium blockchain by Shen, Tao, Li, Tianyu, Yu, Zhuo, Bai, Fenhua, Zhang, Chi

    ISSN: 0920-8542, 1573-0484
    Published: New York Springer US 01.11.2023
    Published in The Journal of supercomputing (01.11.2023)
    “… As the underlying architecture of blockchain, consensus is the key to realizing service-oriented applications of blockchain in terms of its security, efficiency, and scalability optimization…”
    Get full text
    Journal Article
  4. 4

    Computer Aided Verification: 31st International Conference, CAV 2019, New York City, NY, USA, July 15-18, 2019, Proceedings, Part II by Dillig, Isil, Tasiran, Serdar

    ISBN: 3030255425, 9783030255428
    Published: Cham Springer Nature 2019
    “…; security and hyperproperties; synthesis; model checking; cyber-physical systems and machine learning…”
    Get full text
    eBook
  5. 5

    A semantic analysis of key management protocols for wireless sensor networks by Macedonio, Damiano, Merro, Massimo

    ISSN: 0167-6423, 1872-7964
    Published: Elsevier B.V 15.02.2014
    Published in Science of computer programming (15.02.2014)
    “…Gorrieri and Martinelli’s timed Generalized Non-Deducibility on Compositions (tGNDC) schema is a well-known general framework for the formal verification of security protocols in a concurrent scenario…”
    Get full text
    Journal Article
  6. 6

    Complexity in Scalable Computing by Rouson, Damian W.I.

    ISSN: 1058-9244, 1875-919X
    Published: 01.01.2008
    Published in Scientific programming (01.01.2008)
    Get full text
    Journal Article
  7. 7

    Micro-Containerization in Microcontrollers for the IoT by Ribeiro, Eduardo Carreira

    ISBN: 9798381312225
    Published: ProQuest Dissertations & Theses 01.01.2022
    “…Development, deployment, and maintenance of software for traditional computational systems have been revolutionized over the last few decades. Advances…”
    Get full text
    Dissertation
  8. 8

    Robust and compositional verification of object capability patterns by Swasey, David, Garg, Deepak, Dreyer, Derek

    ISSN: 2475-1421, 2475-1421
    Published: 01.10.2017
    “…In scenarios such as web programming, where code is linked together from multiple sources, object capability patterns (OCPs…”
    Get full text
    Journal Article
  9. 9

    A discrete -time approach for valuing real options with underlying mean -reverting stochastic processes by Hahn, Warren Joseph

    ISBN: 0542123436, 9780542123436
    Published: ProQuest Dissertations & Theses 01.01.2005
    “…In this research the recombining binomial lattice approach for valuing real options is generalized to address a common issue in many real valuation problems,…”
    Get full text
    Dissertation