Sciweavers

3500 search results - page 340 / 700
» Implementing Java on Clusters
Sort
View
105
Voted
CCS
2009
ACM
15 years 7 months ago
Ripley: automatically securing web 2.0 applications through replicated execution
Rich Internet applications are becoming increasingly distributed, as demonstrated by the popularity of AJAX or Web 2.0 applications such as Facebook, Google Maps, Hotmail and many...
K. Vikram, Abhishek Prateek, V. Benjamin Livshits
107
Voted
ISSTA
2006
ACM
15 years 6 months ago
The case for analysis preserving language transformation
Static analysis has gained much attention over the past few years in applications such as bug finding and program verification. As software becomes more complex and componentize...
Xiaolan Zhang, Larry Koved, Marco Pistoia, Sam Web...
104
Voted
MSR
2006
ACM
15 years 6 months ago
Tracking defect warnings across versions
Various static analysis tools will analyze a software artifact in order to identify potential defects, such as misused APIs, race conditions and deadlocks, and security vulnerabil...
Jaime Spacco, David Hovemeyer, William Pugh
89
Voted
COMPSAC
2005
IEEE
15 years 6 months ago
Preventing Illegal Usage of Mobile Phone Software
Mobile software industry is suffering from the illegal usage of the software. PKI will not be a solution for small software distribution. We introduce a lightweight but safe metho...
Yun-Sam Kim, Eun-Sun Cho
PPOPP
2005
ACM
15 years 6 months ago
Automated type-based analysis of data races and atomicity
Concurrent programs are notorious for containing errors that are difficult to reproduce and diagnose at run-time. This motivated the development of type systems that statically en...
Amit Sasturkar, Rahul Agarwal, Liqiang Wang, Scott...