Sciweavers

3456 search results - page 549 / 692
» Byte Code Engineering
Sort
View
ICST
2011
IEEE
14 years 6 months ago
Tailored Shielding and Bypass Testing of Web Applications
User input validation is a technique to counter attacks on web applications. In typical client-server architectures, this validation is performed on the client side. This is ineff...
Tejeddine Mouelhi, Yves Le Traon, Erwan Abgrall, B...
AOSD
2011
ACM
14 years 6 months ago
Applying dependability aspects on top of "aspectized" software layers
Dynamic platforms where components can be loaded at runtime can introduce risks to applications stability if components are not previously known before deployment. It may be neede...
Kiev Gama, Didier Donsez
CCIW
2011
Springer
14 years 6 months ago
On the Application of Structured Sparse Model Selection to JPEG Compressed Images
The representation model that considers an image as a sparse linear combination of few atoms of a predefined or learned dictionary has received considerable attention in recent ye...
Giovanni Maria Farinella, Sebastiano Battiato
ICSE
2011
IEEE-ACM
14 years 6 months ago
Inference of field initialization
A raw object is partially initialized, with only some fields set to legal values. It may violate its object invariants, such as that a given field is non-null. Programs often ma...
Fausto Spoto, Michael D. Ernst
ICSE
2011
IEEE-ACM
14 years 6 months ago
Understanding broadcast based peer review on open source software projects
Software peer review has proven to be a successful technique in open source software (OSS) development. In contrast to industry, where reviews are typically assigned to specific ...
Peter C. Rigby, Margaret-Anne D. Storey