Sciweavers

4139 search results - page 740 / 828
» Designing and Implementing Combinator Languages
Sort
View
82
Voted
CCS
2010
ACM
14 years 10 months ago
NoTamper: automatic blackbox detection of parameter tampering opportunities in web applications
Web applications rely heavily on client-side computation to examine and validate form inputs that are supplied by a user (e.g., “credit card expiration date must be valid”). T...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...
ICFEM
2010
Springer
14 years 9 months ago
A Modular Scheme for Deadlock Prevention in an Object-Oriented Programming Model
Despite the advancements of concurrency theory in the past decades, practical concurrent programming has remained a challenging activity. Fundamental problems such as data races an...
Scott West, Sebastian Nanz, Bertrand Meyer
KBSE
2010
IEEE
14 years 9 months ago
An automated approach for finding variable-constant pairing bugs
Named constants are used heavily in operating systems code, both as internal flags and in interactions with devices. Decision making within an operating system thus critically de...
Julia L. Lawall, David Lo
TLT
2010
124views more  TLT 2010»
14 years 9 months ago
Bootstrapping a Culture of Sharing to Facilitate Open Educational Resources
—It seems self-evident that life for teachers would be simplified if there existed a large corpus of relevant resources that was available for them to reuse and for inquisitive s...
Hugh C. Davis, Leslie Carr, Jessie M. N. Hey, Yvon...
CORR
2010
Springer
59views Education» more  CORR 2010»
14 years 9 months ago
Refinement and Verification of Real-Time Systems
This paper discusses highly general mechanisms for specifying the refinement of a real-time system as a collection of lower level parallel components that preserve the timing and ...
Paul Z. Kolano, Carlo A. Furia, Richard A. Kemmere...