Treffer 81 - 100 von 491

81

How Usable are Rust Cryptography APIs?
Mindermann, Kai ; Keck, Philipp ; Wagner, Stefan

Computer Science - Crypt... Computer Science - Progr... Computer Science - Softw...
Report
Zu den Favoriten
82

Borrowing Safe Pointers from Rust in SPARK
Jaloyan, Georges-Axel ; Moy, Yannick ; Paskevich, Andrei

Computer Science - Progr...
Report
Zu den Favoriten
83

Leveraging Test Driven Development with Large Language Models for Reliable and Verifiable Spreadsheet Code Generation: A Research Framework
Thorne, Simon ; Sarkar, Advait
Proceedings of the EuSpRIG 2025 Conference "Spreadsheet Productivity & Risks" ISBN : 978-1-905404-60-5

Software Engineering Computation and Language Programming Languages F.2.2; I.2.7
Report
Zu den Favoriten
84

IsaBIL: A Framework for Verifying (In)correctness of Binaries in Isabelle/HOL (Extended Version)
Griffin, Matt ; Dongol, Brijesh ; Raad, Azalea

Computer Science - Progr...
Report
Zu den Favoriten
85

vNV-Heap: An Ownership-Based Virtually Non-Volatile Heap for Embedded Systems
Gerber, Markus Elias ; Gerhorst, Luis ; Mudraje, Ishwar ; et al.

Computer Science - Opera... Computer Science - Emerg... Computer Science - Progr...
Report
Zu den Favoriten
86

Evaluating AI-generated code for C++, Fortran, Go, Java, Julia, Matlab, Python, R, and Rust
Diehl, Patrick ; Nader, Noujoud ; Brandt, Steve ; et al.

Computer Science - Softw... Computer Science - Artif...
Report
Zu den Favoriten
88

RustViz: Interactively Visualizing Ownership and Borrowing
Gongming ; Luo ; Reddy, Vishnu ; et al.

Computer Science - Progr...
Report
Zu den Favoriten
89

Fearless Asynchronous Communications with Timed Multiparty Session Protocols
Hou, Ping ; Lagaillardie, Nicolas ; Yoshida, Nobuko

Computer Science - Progr...
Report
Zu den Favoriten
90

Violator Spaces: Structure and Algorithms.
Azar, Yossi ; Erlebach, Thomas ; Gärtner, Bernd ; et al.
Algorithms - ESA 2006; 2006, p387-398, 12p

Buch
Zu den Favoriten
91

Provably Fair Cooperative Scheduling
Hähnle, Reiner ; Henrio, Ludovic
The Art, Science, and Engineering of Programming, 2024, Vol. 8, Issue 2, Article 6

Computer Science - Progr...
Report
Zu den Favoriten
92

Extracting functional programs from Coq, in Coq
Annenkov, Danil ; Milo, Mikkel ; Nielsen, Jakob Botsch ; et al.

Computer Science - Progr... Computer Science - Logic...
Report
Zu den Favoriten
93

Typed Design Patterns for the Functional Era
Crichton, Will

Computer Science - Progr...
Report
Zu den Favoriten
94

Combating Reentrancy Bugs on Sharded Blockchains
Kashitsyn, Roman ; Künzler, Robin ; Marić, Ognjen ; et al.

Computer Science - Crypt... D.2.3 D.2.4 C.2.4
Report
Zu den Favoriten
95

Finding smart contract vulnerabilities with ConCert's property-based testing framework
Milo, Mikkel ; Nielsen, Eske Hoy ; Annenkov, Danil ; et al.
FMBC: Formal Methods for Blockchains, 2022

Computer Science - Logic... Computer Science - Progr...
Report
Zu den Favoriten
96

Solo: A Lightweight Static Analysis for Differential Privacy
Abuah, Chike ; Darais, David ; Near, Joseph P.

Computer Science - Progr... Computer Science - Crypt...
Report
Zu den Favoriten
97

Isolating Language-Coding from Problem-Solving: Benchmarking LLMs with PseudoEval
Wu, Jiarong ; Chen, Songqiang ; Cao, Jialun ; et al.

Computer Science - Softw... Computer Science - Compu...
Report
Zu den Favoriten
98

Dieses Ergebnis kann Gästen nicht angezeigt werden.

99

Platforma za udaljeno upravljanje ugradbenim računalnim sustavom temeljena na programskom jeziku Rust
Blažević, Leonard ; Džapo, Hrvoje

ESP8266 Blynk pametne kuće TECHNICAL SCIENCES. Elec... Rust TECHNICAL SCIENCES. Comp...
Dissertation
Zu den Favoriten
100

Trojan Source: Invisible Vulnerabilities
Boucher, Nicholas ; Anderson, Ross

Computer Science - Crypt... Computer Science - Progr...
Report
Zu den Favoriten

Filter