Sciweavers

7124 search results - page 1011 / 1425
» Programming Languages and Operating Systems
Sort
View
USS
2010
15 years 2 months ago
VEX: Vetting Browser Extensions for Security Vulnerabilities
The browser has become the de facto platform for everyday computation. Among the many potential attacks that target or exploit browsers, vulnerabilities in browser extensions have...
Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, ...
CGO
2011
IEEE
14 years 8 months ago
Practical memory checking with Dr. Memory
—Memory corruption, reading uninitialized memory, using freed memory, and other memory-related errors are among the most difficult programming bugs to identify and fix due to t...
Derek Bruening, Qin Zhao
130
Voted
IISWC
2009
IEEE
15 years 11 months ago
Logicalization of communication traces from parallel execution
—Communication traces are integral to performance modeling and analysis of parallel programs. However, execution on a large number of nodes results in a large trace volume that i...
Qiang Xu, Jaspal Subhlok, Rong Zheng, Sara Voss
SIGMOD
1993
ACM
140views Database» more  SIGMOD 1993»
15 years 9 months ago
Second-Order Signature: A Tool for Specifying Data Models, Query Processing, and Optimization
Abstract: We propose a framework for the specification of extensible database systems. A particular goal is to implement a software component for parsing and rule-based optimizatio...
Ralf Hartmut Güting
HASE
1999
IEEE
15 years 9 months ago
Model Checking UML Statechart Diagrams Using JACK
Statechart Diagrams provide a graphical notation for describing dynamic aspects of system behaviour within the Unified Modeling Language (UML). In this paper we present a branchin...
Stefania Gnesi, Diego Latella, Mieke Massink
« Prev « First page 1011 / 1425 Last » Next »