Sciweavers

2651 search results - page 446 / 531
» Experiences with the Use of a Configuration Language
Sort
View
WWW
2010
ACM
15 years 6 months ago
Fine-grained privilege separation for web applications
We present a programming model for building web applications with security properties that can be confidently verified during a security review. In our model, applications are d...
Akshay Krishnamurthy, Adrian Mettler, David Wagner
SIGCSE
2010
ACM
154views Education» more  SIGCSE 2010»
15 years 6 months ago
Teaching computational thinking through musical live coding in scratch
This paper discusses our experience in teaching an interdisciplinary general education course called Sound Thinking that is offered jointly by our Dept. of Computer Science and De...
Alex Ruthmann, Jesse M. Heines, Gena R. Greher, Pa...
ICDAR
2009
IEEE
15 years 6 months ago
Document Image Retrieval with Local Feature Sequences
In recent years, many document image retrieval algorithms have been proposed. However, most of the current approaches either need good quality images or depend on the page layout ...
Jilin Li, Zhi-Gang Fan, Yadong Wu, Ning Le
KBSE
2009
IEEE
15 years 6 months ago
Inferring Method Effect Summaries for Nested Heap Regions
Effect systems are important for reasoning about the side effects of a program. Although effect systems have been around for decades, they have not been widely adopted in practice...
Mohsen Vakilian, Danny Dig, Robert L. Bocchino Jr....
SPIN
2009
Springer
15 years 6 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...