Results 41 to 50 of about 1,014 (107)

Étude Préliminaire À Une Utilisation De Mémoires Secondaires Pour Le Stockage Des Métadonnées Java Dans Des Systèmes Contraints. [PDF]

open access: yes, 2011
National audienceL'utilisation de langages robustes et de haut niveau, basés sur des machines virtuelles comme le Java, est désormais possible dans des systèmes aussi petits que les cartes à puce ou les capteurs réseau.
Cogniaux, Geoffroy   +2 more
core   +1 more source

A Low-Footprint Java-to-Native Compilation Scheme Using Formal Methods

open access: yes, 2006
Ahead-of-Time and Just-in-Time compilation are common ways to improve runtime performances of restrained systems like Java Card by turning critical Java methods into native code.
Adachi, I.   +149 more
core   +1 more source

Adição de funções de criptografia simétrica em um applet de código aberto com suporte via middleware OpenSC [PDF]

open access: yes, 2017
TCC(graduação) - Universidade Federal de Santa Catarina. Centro Tecnológico. Ciências da Computação.O sigilo dos dados é um dos principais pilares da segurança em computação.
da Palma, Lucas Machado   +1 more
core  

Mechanized semantics [PDF]

open access: yes, 2010
The goal of this lecture is to show how modern theorem provers---in this case, the Coq proof assistant---can be used to mechanize the specification of programming languages and their semantics, and to reason over individual programs and over generic ...
Leroy, Xavier
core   +4 more sources

Alternativas en el desarrollo de aplicaciones para móviles [PDF]

open access: yes, 2000
Cuando se alcanza la etapa de madurez del mercado GSM, como sería el caso de España, se impulsan nuevos servicios y aplicaciones para móviles, cuyo desarrollo puede fundamentarse en diversas tecnologías.
Bodas, J   +3 more
core  

The Transitivity of Trust Problem in the Interaction of Android Applications

open access: yes, 2012
Mobile phones have developed into complex platforms with large numbers of installed applications and a wide range of sensitive data. Application security policies limit the permissions of each installed application.
Bartsch, Steffen   +4 more
core   +1 more source

Electronic Footprints in the Sand: Technologies for Assisting Domestic Violence Survivors [PDF]

open access: yes, 2014
With the rapid growth and spread of Internet-based social support systems, the impact that these systems can make to society – be it good or bad – has become more significant and can make a real difference to people’s lives.
B. Krishnamurthy   +6 more
core   +1 more source

Ensuring the Correctness of Lightweight Tactics for JavaCard Dynamic Logic

open access: yesElectronic Notes in Theoretical Computer Science, 2008
AbstractThe interactive theorem prover developed in the KeY project, which implements a sequent calculus for JavaCard Dynamic Logic (JavaCardDL) is based on taclets. Taclets are lightweight tactics with easy to master syntax and semantics. Adding new taclets to the calculus is quite simple, but poses correctness problems.
Bubel, Richard   +2 more
openaire   +1 more source

A Low-Footprint Class Loading Mechanism for Embedded Java Virtual Machines [PDF]

open access: yes, 2004
This paper shows that it is possible to dramatically reduce the memory consumption of classes loaded in an embedded Java virtual machine without reducing its functionalities.
Courbot, Alexandre   +2 more
core   +2 more sources

Towards correct-by-construction product variants of a software product line: GFML, a formal language for feature modules

open access: yes, 2015
Software Product Line Engineering (SPLE) is a software engineering paradigm that focuses on reuse and variability. Although feature-oriented programming (FOP) can implement software product line efficiently, we still need a method to generate and prove ...
Dubois, Catherine   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy