-
1
-
-
33745593821
-
Protection against untrusted code: The JIT compiler security hole, and what you can do about it
-
as of January 2001
-
A. W. Appel, Protection against untrusted code: The JIT compiler security hole, and what you can do about it, http://www-106.ibm.com/developerworks/library/untrusted-code/, as of January 2001.
-
-
-
Appel, A.W.1
-
2
-
-
0000703331
-
Applying new scheduling theory to static priority pre-emptive scheduling
-
N. Audsley, A. Burns, M. Richardson, K. Tindell, and A. Wellings, Applying New Scheduling Theory to Static Priority Pre-emptive Scheduling, Software Engineering Journal, 8(5), 284-92, 1993.
-
(1993)
Software Engineering Journal
, vol.8
, Issue.5
, pp. 284-292
-
-
Audsley, N.1
Burns, A.2
Richardson, M.3
Tindell, K.4
Wellings, A.5
-
4
-
-
0003824628
-
High integrity Ada: The SPARK approach
-
Addison Wesley
-
J. Barnes, High integrity Ada: the SPARK approach, Addison Wesley, 1997.
-
(1997)
-
-
Barnes, J.1
-
5
-
-
0242444391
-
The utilisation of the Java language in safety critical system development
-
MSc dissertation, Department of Computer Science, University of York
-
S. Bentley, The Utilisation of the Java Language in Safety Critical System Development, MSc dissertation, Department of Computer Science, University of York, 1999.
-
(1999)
-
-
Bentley, S.1
-
7
-
-
0003644553
-
The real-time specification for Java
-
Addison-Wesley
-
G. Bollella, et al., The Real-Time Specification for Java, Addison-Wesley, 2000.
-
(2000)
-
-
Bollella, G.1
-
8
-
-
0010687529
-
High intensity system specification and design
-
Springer-Verlag
-
J. P. Bowen and M. G. Hinchey, High Intensity System Specification and Design, Springer-Verlag, 1998.
-
(1998)
-
-
Bowen, J.P.1
Hinchey, M.G.2
-
9
-
-
84960853881
-
Model checking programs
-
G. Brat, K. Havelund, S. Park, and W. Visser, Model Checking Programs, In IEEE International Conference on Automated Software Engineering (ASE), Sep. 2000.
-
IEEE International Conference on Automated Software Engineering (ASE), Sep. 2000
-
-
Brat, G.1
Havelund, K.2
Park, S.3
Visser, W.4
-
11
-
-
33747127291
-
The Ravenscar tasking profile for high integrity real-time programs
-
In L. Asplund, editor; Berlin Heidelberg, Germany, Springer-Verlag
-
A. Burns, B. Dobbing, and G. Romanski, The Ravenscar Tasking Profile for High Integrity Real-Time Programs, In L. Asplund, editor, Proceedings of Ada-Europe 98, LNCS, Vol. 1411, pages 263-275, Berlin Heidelberg, Germany, Springer-Verlag, 1998.
-
(1998)
Proceedings of Ada-Europe 98, LNCS
, vol.1411
, pp. 263-275
-
-
Burns, A.1
Dobbing, B.2
Romanski, G.3
-
13
-
-
0242527897
-
The Ravenscar profile for high integrity Java programs?
-
March
-
B. Dobbing, The Ravenscar Profile for High Integrity Java Programs?, ACM Ada Letters, Vol. 21, Issue. 1, March 2001.
-
(2001)
ACM Ada Letters
, vol.21
, Issue.1
-
-
Dobbing, B.1
-
14
-
-
0005371644
-
Describing the semantics of Java and proving type soundness
-
(ed. J. Alves-Foss), Springer-Verlag, Berlin
-
S. Drossopoulou and S. Eisenbach, Describing the Semantics of Java and Proving Type Soundness, in LNCS 1523 Formal Syntax and semantics of Java (ed. J. Alves-Foss), Springer-Verlag, Berlin, 1999.
-
(1999)
LNCS 1523 Formal Syntax and Semantics of Java
-
-
Drossopoulou, S.1
Eisenbach, S.2
-
15
-
-
0003801299
-
Inside Java™ 2 platform security: Architecture, API design, and implementation
-
Addison-Wesley
-
Li Gong, Inside Java™ 2 Platform Security: Architecture, API Design, and Implementation, Addison-Wesley, 1999.
-
(1999)
-
-
Gong, L.1
-
16
-
-
0003518498
-
-
Addison Wesley
-
J. Gosling, B. Joy, G. Steele, and G. Bracha, The Java Language Specification, 2nd Ed., Addison Wesley, 2000.
-
(2000)
The Java Language Specification, 2nd Ed.
-
-
Gosling, J.1
Joy, B.2
Steele, G.3
Bracha, G.4
-
17
-
-
0000952504
-
Formalizing the safety of Java, the Java virtual machine, and Java card
-
December
-
P. H. Hartel and L. Moreau, Formalizing the Safety of Java, the Java Virtual Machine, and Java Card, ACM Computing Surveys, Vol. 33, No. 4, December 2001.
-
(2001)
ACM Computing Surveys
, vol.33
, Issue.4
-
-
Hartel, P.H.1
Moreau, L.2
-
19
-
-
0242444383
-
A study of high integrity ada: Language review
-
Technical Report SLS31c/73-1-D, Version 2, York Software Engineering, University of York, July
-
A. Hutcheon, B. Jepson, D. Jordan, and I. Wand, A Study of High Integrity Ada: Language Review, Technical Report SLS31c/73-1-D, Version 2, York Software Engineering, University of York, July 1992.
-
(1992)
-
-
Hutcheon, A.1
Jepson, B.2
Jordan, D.3
Wand, I.4
-
20
-
-
0242527894
-
International J consortium specification: Real-time core extensions, revision 1.0.14
-
September
-
J Consortium, International J Consortium Specification: Real-Time Core Extensions, Revision 1.0.14, www.j-consortium.org, September 2000.
-
(2000)
-
-
Consortium, J.1
-
21
-
-
84874410958
-
Java PathFinder
-
last accessed in April 2001
-
Java PathFinder, http://ase.arc.nasa.gov/visser/jpf/, last accessed in April 2001.
-
-
-
-
22
-
-
0141460203
-
Assessment of the Java programming language for use in high integrity systems
-
York Technical Report (YCS 341), Department of Computer Science, University of York
-
J. Kwon, A. Wellings, and S. King, Assessment of the Java Programming Language for Use in High Integrity Systems, York Technical Report (YCS 341), Department of Computer Science, University of York, 2002, available at http://www.cs.york.ac.uk/ftpdir/reports/YCS-2002-341.pdf.
-
(2002)
-
-
Kwon, J.1
Wellings, A.2
King, S.3
-
23
-
-
16244417299
-
Ravenscar-Java: A high integrity profile for real-time Java
-
York Technical Report (YCS 342), Department of Computer Science, University of York
-
J. Kwon, A. Wellings, and S. King, Ravenscar-Java: A High Integrity Profile for Real-Time Java, York Technical Report (YCS 342), Department of Computer Science, University of York, 2002, available at http://www.cs.york.ac.uk/ftpdir/report/YCS-2002-342.pdf.
-
(2002)
-
-
Kwon, J.1
Wellings, A.2
King, S.3
-
24
-
-
0004111037
-
ESC/Java User's Manual
-
SRC Technical Note 2000-002, Compaq Systems Research Center, Palo Alto, CA
-
K.R.M. Leino, G. Nelson, and J.B. Saxe, ESC/Java User's Manual, SRC Technical Note 2000-002, Compaq Systems Research Center, Palo Alto, CA, 2000.
-
(2000)
-
-
Leino, K.R.M.1
Nelson, G.2
Saxe, J.B.3
-
25
-
-
0022730231
-
Software safety: Why, what, and how
-
ACM, June
-
N. G. Leveson, Software Safety: Why, What, and How, Computing Surveys, Vol. 18, No. 2, ACM, June 1986.
-
(1986)
Computing Surveys
, vol.18
, Issue.2
-
-
Leveson, N.G.1
-
26
-
-
0026104017
-
Software safety in embedded computer systems
-
February
-
N. G. Leveson, Software Safety in Embedded Computer Systems, Communications of the ACM, Vol. 34, No. 2, February 1991.
-
(1991)
Communications of the ACM
, vol.34
, Issue.2
-
-
Leveson, N.G.1
-
27
-
-
84974687699
-
Scheduling algorithms for multiprogramming in a hard real-time environment
-
C. Liu and J. Layland, Scheduling Algorithms for Multiprogramming in a Hard Real-Time Environment, Journal of ACM, 20(1), 46-61, 1973.
-
(1973)
Journal of ACM
, vol.20
, Issue.1
, pp. 46-61
-
-
Liu, C.1
Layland, J.2
-
28
-
-
0041644054
-
Guidelines for the use of the C language in vehicle based software
-
The Motor Industry Software Reliability Association; The Motor Industry Research Association
-
The Motor Industry Software Reliability Association, Guidelines for the use of the C language in vehicle based software, The Motor Industry Research Association, 1998.
-
(1998)
-
-
-
29
-
-
0242527896
-
Review guidelines for software languages for use in nuclear power plant systems
-
NUREG/CR-6463, U.S. Nuclear Regulatory Commission
-
H. Hetcht, M. Hecht, S. Graff, et al., Review Guidelines for Software Languages for Use in Nuclear Power Plant Systems, NUREG/CR-6463, U.S. Nuclear Regulatory Commission, 1997.
-
(1997)
-
-
Hetcht, H.1
Hecht, M.2
Graff, S.3
-
30
-
-
0025436318
-
Evaluation of safety-critical software
-
June
-
D. L. Parnas, A. J. van Schouwen, and S. P. Kwan, Evaluation of Safety-Critical Software, Communications of the ACM, Vol. 33, No. 6, June 1990.
-
(1990)
Communications of the ACM
, vol.33
, Issue.6
-
-
Parnas, D.L.1
Van Schouwen, A.J.2
Kwan, S.P.3
-
33
-
-
0038588309
-
Java™ 2 platform micro edition (J2ME™) technology for creating mobile devices
-
Sun Microsystems® White paper, Sun Microsystems®
-
Sun Microsystems®, Java™ 2 Platform Micro Edition (J2ME™) Technology for Creating Mobile Devices, White paper, Sun Microsystems® 2000.
-
(2000)
-
-
|