Sciweavers

8086 search results - page 1528 / 1618
» On the Implementation of Dynamic Patterns
Sort
View
165
Voted
SIGSOFT
2003
ACM
16 years 4 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
135
Voted
WWW
2001
ACM
16 years 4 months ago
Enabling full service surrogates using the portable channel representation
The simplicity of the basic client/server model of Web services led quickly to its widespread adoption, but also to scalability and performance problems. The technological respons...
Micah Beck, Terry Moore, Leif Abrahamsson, Christo...
257
Voted
POPL
2009
ACM
16 years 4 months ago
A combination framework for tracking partition sizes
ibe an abstract interpretation based framework for proving relationships between sizes of memory partitions. Instances of this framework can prove traditional properties such as m...
Sumit Gulwani, Tal Lev-Ami, Mooly Sagiv
CHI
2009
ACM
16 years 4 months ago
Map torchlight: a mobile augmented reality camera projector unit
The advantages of paper-based maps have been utilized in the field of mobile Augmented Reality (AR) in the last few years. Traditional paper-based maps provide high-resolution, la...
Johannes Schöning, Michael Rohs, Sven G. Krat...
166
Voted
PPOPP
2009
ACM
16 years 4 months ago
Formal verification of practical MPI programs
This paper considers the problem of formal verification of MPI programs operating under a fixed test harness for safety properties without building verification models. In our app...
Anh Vo, Sarvani S. Vakkalanka, Michael Delisi, Gan...
« Prev « First page 1528 / 1618 Last » Next »