Sciweavers

3 search results - page 1 / 1
» Innocuous Constructor-Sharing Combinations
Sort
View
RTA
1997
Springer
13 years 9 months ago
Innocuous Constructor-Sharing Combinations
Abstract. We investigate conditions under which con uence and or termination are preserved for constructor-sharing and hierarchical combinations of rewrite systems, one of which is...
Nachum Dershowitz
TKDE
2008
103views more  TKDE 2008»
13 years 4 months ago
Detecting Word Substitutions in Text
Searching for words on a watchlist is one way in which large-scale surveillance of communication can be done, for example, in intelligence and counterterrorism settings. One obviou...
SzeWang Fong, Dmitri Roussinov, David B. Skillicor...
SP
2008
IEEE
112views Security Privacy» more  SP 2008»
13 years 11 months ago
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications
Web applications are ubiquitous, perform missioncritical tasks, and handle sensitive user data. Unfortunately, web applications are often implemented by developers with limited se...
Davide Balzarotti, Marco Cova, Viktoria Felmetsger...