Sciweavers

395 search results - page 67 / 79
» On the Effectiveness of GC in Java
Sort
View
110
Voted
ICST
2011
IEEE
14 years 3 months ago
Tailored Shielding and Bypass Testing of Web Applications
User input validation is a technique to counter attacks on web applications. In typical client-server architectures, this validation is performed on the client side. This is ineff...
Tejeddine Mouelhi, Yves Le Traon, Erwan Abgrall, B...
CCS
2009
ACM
16 years 8 days ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
93
Voted
VRML
1999
ACM
15 years 4 months ago
The Kinetic Mandala: Audio a-Life in a Web-based 3D Environment
We describe the use of artificial life (genetic) algorithms to generate auditory behaviors within 3D graphical environments. Small, high-quality soundfiles are algorithmically rec...
Maribeth Back, Maureen C. Stone
88
Voted
PLDI
1998
ACM
15 years 3 months ago
Type-Based Alias Analysis
This paper evaluates three alias analyses based on programming language types. The first analysis uses type compatibility to determine aliases. The second extends the first by u...
Amer Diwan, Kathryn S. McKinley, J. Eliot B. Moss
114
Voted
IJDE
2007
123views more  IJDE 2007»
14 years 11 months ago
Identifying Authorship by Byte-Level N-Grams: The Source Code Author Profile (SCAP) Method
Source code author identification deals with identifying the most likely author of a computer program, given a set of predefined author candidates. There are several scenarios whe...
Georgia Frantzeskou, Efstathios Stamatatos, Stefan...