Sciweavers

3256 search results - page 474 / 652
» Applications of Formal Methods to System Design and Verifica...
Sort
View
SIGSOFT
2003
ACM
16 years 6 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler
CHI
2009
ACM
16 years 6 months ago
Amplifying community content creation with mixed initiative information extraction
Although existing work has explored both information extraction and community content creation, most research has focused on them in isolation. In contrast, we see the greatest le...
Raphael Hoffmann, Saleema Amershi, Kayur Patel, Fe...
COMCOM
2010
133views more  COMCOM 2010»
15 years 5 months ago
Measuring long-term location privacy in vehicular communication systems
Vehicular communication systems are an emerging form of communication that enables new ways of cooperation among vehicles, traffic operators, and service providers. However, many ...
Zhendong Ma, Frank Kargl, Michael Weber
SPW
2000
Springer
15 years 9 months ago
Users and Trust in Cyberspace
The underlying belief and knowledge models assumed by various kinds of authentication protocols have been studied for well over 10 years now. On the other hand, the related questio...
Pekka Nikander, Kristiina Karvonen
SIGMOD
2009
ACM
148views Database» more  SIGMOD 2009»
16 years 5 months ago
Combining keyword search and forms for ad hoc querying of databases
A common criticism of database systems is that they are hard to query for users uncomfortable with a formal query language. To address this problem, form-based interfaces and keyw...
Eric Chu, Akanksha Baid, Xiaoyong Chai, AnHai Doan...