Sciweavers

940 search results - page 69 / 188
» Rules and Strategies in Java
Sort
View
121
Voted
SAC
2006
ACM
15 years 6 months ago
Noxes: a client-side solution for mitigating cross-site scripting attacks
Web applications are becoming the dominant way to provide access to on-line services. At the same time, web application vulnerabilities are being discovered and disclosed at an al...
Engin Kirda, Christopher Krügel, Giovanni Vig...
94
Voted
PLDI
2010
ACM
15 years 5 months ago
Jinn: synthesizing dynamic bug detectors for foreign language interfaces
Programming language specifications mandate static and dynamic analyses to preclude syntactic and semantic errors. Although individual languages are usually well-specified, comp...
Byeongcheol Lee, Ben Wiedermann, Martin Hirzel, Ro...
LOPSTR
2004
Springer
15 years 6 months ago
Natural Rewriting for General Term Rewriting Systems
We address the problem of an efficient rewriting strategy for general term rewriting systems. Several strategies have been proposed over the last two decades for rewriting, the mos...
Santiago Escobar, José Meseguer, Prasanna T...
UM
2007
Springer
15 years 6 months ago
Eliciting Adaptation Knowledge from On-Line Tutors to Increase Motivation
In the classroom, teachers know how to motivate their students and how to exploit this knowledge to adapt or optimize their instruction when a student shows signs of demotivation. ...
Teresa Hurley, Stephan Weibelzahl
115
Voted
BROADNETS
2005
IEEE
15 years 2 months ago
Opportunistic power allocation for fading channels with non-cooperative users and random access
— We present a game-theoretical model of a wireless communication system with multiple competing users sharing a multiaccess fading channel. With a specified capture rule and a ...
Jun Sun 0007, Eytan Modiano