Sciweavers

18 search results - page 4 / 4
» Completeness Analysis for Incomplete Object-Oriented Program...
Sort
View
121
Voted
ISSTA
2012
ACM
13 years 3 months ago
Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities
Use-after-free vulnerabilities are rapidly growing in popularity, especially for exploiting web browsers. Use-afterfree (and double-free) vulnerabilities are caused by a program o...
Juan Caballero, Gustavo Grieco, Mark Marron, Anton...
114
Voted
ICSE
2004
IEEE-ACM
16 years 1 months ago
Imposing a Memory Management Discipline on Software Deployment
The deployment of software components frequently fails because dependencies on other components are not declared explicitly or are declared imprecisely. This results in an incompl...
Eelco Dolstra, Eelco Visser, Merijn de Jonge
101
Voted
ACL
1996
15 years 2 months ago
Chart Generation
Charts constitute a natural uniform architecture for parsing and generation provided string position is replaced by a notion more appropriate to logical forms and that measures ar...
Martin Kay