Many modern software systems are often large, distributed, written in more than one programming language, and developed using pre-built components. This paper presents the results...
We present a technique for finding security vulnerabilities in Web applications. SQL Injection (SQLI) and crosssite scripting (XSS) attacks are widespread forms of attack in whic...
Adam Kiezun, Philip J. Guo, Karthick Jayaraman, Mi...
A memory leak in a garbage-collected program occurs when the program inadvertently maintains references to objects that it no longer needs. Memory leaks cause systematic heap grow...
: One main characteristic of virtual enterprises are short-term collaborations between business partners to provide efficient and individualized services to customers. The MOVE pro...
Grid technologies and infrastructures facilitate distributed resource sharing and coordination in dynamic, heterogeneous, multi-institutional environments. A replica catalog is a ...