Search Results - "Appel, A.W."

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    Using memory errors to attack a virtual machine by Govindavajhala, S., Appel, A.W.

    “…We present an experimental study showing that soft memory errors can lead to serious security vulnerabilities in Java and .NET virtual machines, or in any…”
    Get full text
    Conference Proceeding
  2. 2

    Foundational proof-carrying code by Appel, A.W.

    “…Proof-carrying code is a framework for the mechanical verification of safety properties of machine-language programs, but the problem arises of "quis custodiat…”
    Get full text
    Conference Proceeding
  3. 3

    A stratified semantics of general references embeddable in higher-order logic by Ahmed, A.J., Appel, A.W., Virga, R.

    “…We demonstrate a semantic model of general references - that is, mutable memory cells that may contain values of any (statically-checked) closed type,…”
    Get full text
    Conference Proceeding Journal Article
  4. 4
  5. 5

    Simulating digital circuits with one bit per wire by Appel, A.W.

    “…An algorithm to simulate synchronous digital logic circuits in space proportional to one bit per wire, as long as the specification has a hierarchical nature,…”
    Get full text
    Journal Article
  6. 6

    Access control on the Web using proof-carrying authorization by Bauer, L., Schneider, M.A., Felten, E.W., Appel, A.W.

    “…We describe a system for access control on the Web that is based on the ideas of proof-carrying authorization (PCA). Our system is implemented as modules that…”
    Get full text
    Conference Proceeding
  7. 7

    Traversal-based visualization of data structures by Korn, J.L., Appel, A.W.

    “…Algorithm animation systems and graphical debuggers perform the task of translating program state into visual representations. While algorithm animations…”
    Get full text
    Conference Proceeding