Sciweavers

481 search results - page 52 / 97
» Differential symbolic execution
Sort
View
ESAW
2000
Springer
15 years 4 months ago
Context-Dependency in Internet-Agent Coordination
The design and development of Internet applications can take advantage of a paradigm based on autonomous and mobile agents. However, agent mobility introduces peculiar coordinatio...
Giacomo Cabri, Letizia Leonardi, Franco Zambonelli
130
Voted
CAV
2008
Springer
139views Hardware» more  CAV 2008»
15 years 2 months ago
CSIsat: Interpolation for LA+EUF
We present CSIsat, an interpolating decision procedure for the quantifier-free theory of rational linear arithmetic and equality with uninterpreted function symbols. Our implementa...
Dirk Beyer, Damien Zufferey, Rupak Majumdar
80
Voted
ICSE
2009
IEEE-ACM
15 years 7 months ago
Automatic creation of SQL Injection and cross-site scripting attacks
We present a technique for finding security vulnerabilities in Web applications. SQL Injection (SQLI) and crosssite scripting (XSS) attacks are widespread forms of attack in whic...
Adam Kiezun, Philip J. Guo, Karthick Jayaraman, Mi...
87
Voted
OOPSLA
2005
Springer
15 years 6 months ago
Subtext: uncovering the simplicity of programming
Representing programs as text strings makes programming harder then it has to be. The source text of a program is far removed from its behavior. Bridging this conceptual gulf is w...
Jonathan Edwards
119
Voted
ICLP
1995
Springer
15 years 4 months ago
A Method for Implementing Equational Theories as Logic Programs
Equational theories underly many elds of computing, including functional programming, symbolic algebra, theorem proving, term rewriting and constraint solving. In this paper we sh...
Mantis H. M. Cheng, Douglas Stott Parker Jr., Maar...