Sciweavers

14 search results - page 3 / 3
» Design and evaluation of birthmarks for detecting theft of j...
Sort
View
PLDI
2010
ACM
13 years 7 months ago
DRFX: a simple and efficient memory model for concurrent programming languages
The most intuitive memory model for shared-memory multithreaded programming is sequential consistency (SC), but it disallows the use of many compiler and hardware optimizations th...
Daniel Marino, Abhayendra Singh, Todd D. Millstein...
SIGCSE
2010
ACM
183views Education» more  SIGCSE 2010»
13 years 11 months ago
Electronic commerce virtual laboratory
Website security is essential for successful e-commerce ventures, but the vital “how-to” components of security are often lacking in academic courses. This paper describes our...
Joel Coffman, Alfred C. Weaver
LCTRTS
2005
Springer
13 years 10 months ago
Syncopation: generational real-time garbage collection in the metronome
Real-time garbage collection has been shown to be feasible, but for programs with high allocation rates, the utilization achievable is not sufficient for some systems. Since a hi...
David F. Bacon, Perry Cheng, David Grove, Martin T...
PLDI
2009
ACM
14 years 2 days ago
TAJ: effective taint analysis of web applications
Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods and parameters may flow into security-sensitive operations. Taint analysis...
Omer Tripp, Marco Pistoia, Stephen J. Fink, Manu S...