Sciweavers

15860 search results - page 2755 / 3172
» Agent-Based Software Engineering
Sort
View
SIGSOFT
2004
ACM
16 years 5 months ago
Merging partial behavioural models
Constructing comprehensive operational models of intended system behaviour is a complex and costly task. Consequently, practitioners have adopted techniques that support increment...
Marsha Chechik, Sebastián Uchitel
SIGSOFT
2003
ACM
16 years 5 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
SIGSOFT
2002
ACM
16 years 5 months ago
Invariant inference for static checking
Static checking can verify the absence of errors in a program, but often requires written annotations or specifications. As a result, static checking can be difficult to use effec...
Jeremy W. Nimmer, Michael D. Ernst
WWW
2009
ACM
16 years 5 months ago
All your contacts are belong to us: automated identity theft attacks on social networks
Social networking sites have been increasingly gaining popularity. Well-known sites such as Facebook have been reporting growth rates as high as 3% per week [5]. Many social netwo...
Leyla Bilge, Thorsten Strufe, Davide Balzarotti, E...
WWW
2008
ACM
16 years 5 months ago
Tagpedia: a Semantic Reference to Describe and Search for Web Resources
Nowadays the Web represents a growing collection of an enormous amount of contents where the need for better ways to find and organize the available data is becoming a fundamental...
Francesco Ronzano, Andrea Marchetti, Maurizio Tesc...
« Prev « First page 2755 / 3172 Last » Next »