Sciweavers

3456 search results - page 375 / 692
» Byte Code Engineering
Sort
View
SIGSOFT
2008
ACM
16 years 5 months ago
Effective blame for information-flow violations
Programs trusted with secure information should not release that information in ways contrary to system policy. However, when a program contains an illegal flow of information, cu...
Dave King 0002, Trent Jaeger, Somesh Jha, Sanjit A...
ICSE
2004
IEEE-ACM
16 years 4 months ago
SNIAFL: Towards a Static Non-Interactive Approach to Feature Location
To facilitate software maintenance and evolution, a helpful step is to locate features concerned in a particular maintenance task. In the literature, both dynamic and interactive ...
Wei Zhao, Lu Zhang, Yin Liu, Jiasu Sun, Fuqing Yan...
118
Voted
WWW
2010
ACM
15 years 11 months ago
Fine-grained privilege separation for web applications
We present a programming model for building web applications with security properties that can be confidently verified during a security review. In our model, applications are d...
Akshay Krishnamurthy, Adrian Mettler, David Wagner
AOSD
2009
ACM
15 years 11 months ago
Can we refactor conditional compilation into aspects?
Systems software uses conditional compilation to manage crosscutting concerns in a very fine-grained and efficient way, but at the expense of tangled and scattered conditional c...
Bram Adams, Wolfgang De Meuter, Herman Tromp, Ahme...
PPPJ
2009
ACM
15 years 11 months ago
Automatic parallelization for graphics processing units
Accelerated graphics cards, or Graphics Processing Units (GPUs), have become ubiquitous in recent years. On the right kinds of problems, GPUs greatly surpass CPUs in terms of raw ...
Alan Leung, Ondrej Lhoták, Ghulam Lashari