Sciweavers

80 search results - page 16 / 16
» Insecure Programming: How Culpable is a Language's Syntax
Sort
View
SCAM
2007
IEEE
13 years 11 months ago
Quality Assessment for Embedded SQL
—The access of information systems to underlying relational databases is commonly programmed using embedded SQL queries. Such embedded queries may take the form of string literal...
Huib van den Brink, Rob van der Leek, Joost Visser
PADL
2009
Springer
14 years 5 months ago
Ad Hoc Data and the Token Ambiguity Problem
Abstract. PADS is a declarative language used to describe the syntax and semantic properties of ad hoc data sources such as financial transactions, server logs and scientific data ...
Qian Xi, Kathleen Fisher, David Walker, Kenny Qili...
UIST
2006
ACM
13 years 10 months ago
SwingStates: adding state machines to the swing toolkit
This article describes SwingStates, a library that adds state machines to the Java Swing user interface toolkit. Unlike traditional approaches, which use callbacks or listeners to...
Caroline Appert, Michel Beaudouin-Lafon
ECOOP
1999
Springer
13 years 9 months ago
Visualizing Reference Patterns for Solving Memory Leaks in Java
Many Java programmers believe they do not have to worry about memory management because of automatic garbage collection. In fact, many Java programs run out of memory unexpectedly ...
Wim De Pauw, Gary Sevitsky
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
13 years 10 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...