Sciweavers

14779 search results - page 2810 / 2956
» On Ultrametric Algorithmic Information
Sort
View
ICSE
2008
IEEE-ACM
16 years 20 days ago
Static detection of cross-site scripting vulnerabilities
Web applications support many of our daily activities, but they often have security problems, and their accessibility makes them easy to exploit. In cross-site scripting (XSS), an...
Gary Wassermann, Zhendong Su
ICSE
2008
IEEE-ACM
16 years 20 days ago
Data flow testing of service-oriented workflow applications
WS-BPEL applications are a kind of service-oriented application. They use XPath extensively to integrate loosely-coupled workflow steps. However, XPath may extract wrong data from...
Lijun Mei, W. K. Chan, T. H. Tse
SIGSOFT
2008
ACM
16 years 18 days ago
Javert: fully automatic mining of general temporal properties from dynamic traces
Program specifications are important for many tasks during software design, development, and maintenance. Among these, temporal specifications are particularly useful. They expres...
Mark Gabel, Zhendong Su
WWW
2009
ACM
16 years 16 days ago
A search-based method for forecasting ad impression in contextual advertising
Contextual advertising (also called content match) refers to the placement of small textual ads within the content of a generic web page. It has become a significant source of rev...
Xuerui Wang, Andrei Z. Broder, Marcus Fontoura, Va...
WWW
2009
ACM
16 years 16 days ago
Co-browsing dynamic web pages
Collaborative browsing, or co-browsing, is the co-navigation of the web with other people at-a-distance, supported by software that takes care of synchronizing the browsers. Curre...
Dietwig Lowet, Daniel Goergen
« Prev « First page 2810 / 2956 Last » Next »