Sciweavers

69 search results - page 13 / 14
» Adding wildcards to the Java programming language
Sort
View
POPL
2006
ACM
14 years 6 months ago
The essence of command injection attacks in web applications
Web applications typically interact with a back-end database to retrieve persistent data and then present the data to the user as dynamically generated output, such as HTML web pa...
Zhendong Su, Gary Wassermann
POPL
2009
ACM
14 years 6 months ago
Feedback-directed barrier optimization in a strongly isolated STM
Speed improvements in today's processors have largely been delivered in the form of multiple cores, increasing the importance of ions that ease parallel programming. Software...
Nathan Grasso Bronson, Christos Kozyrakis, Kunle O...
ACMMSP
2006
ACM
250views Hardware» more  ACMMSP 2006»
14 years 7 days ago
What do high-level memory models mean for transactions?
Many people have proposed adding transactions, or atomic blocks, to type-safe high-level programming languages. However, researchers have not considered the semantics of transacti...
Dan Grossman, Jeremy Manson, William Pugh
ICAC
2006
IEEE
14 years 9 days ago
A Runtime Adaptation Framework for Native C and Bytecode Applications
— The need for self-healing software to respond with a reactive, proactive or preventative action as a result of changes in its environment has added the non-functional requireme...
Rean Griffith, Gail E. Kaiser
ACSW
2004
13 years 7 months ago
A Framework for Obfuscated Interpretation
Software protection via obscurity is now considered fundamental for securing software systems. This paper proposes a framework for obfuscating the program interpretation instead o...
Akito Monden, Antoine Monsifrot, Clark D. Thombors...