Sciweavers

2236 search results - page 213 / 448
» Secure Software Design in Practice
Sort
View
154
Voted
EUROSYS
2009
ACM
16 years 26 days ago
User interactions in social networks and their implications
Social networks are popular platforms for interaction, communication and collaboration between friends. Researchers have recently proposed an emerging class of applications that l...
Christo Wilson, Bryce Boe, Alessandra Sala, Krishn...
122
Voted
EUROSYS
2007
ACM
16 years 26 days ago
Melange: creating a "functional" internet
Most implementations of critical Internet protocols are written in type-unsafe languages such as C or C++ and are regularly vulnerable to serious security and reliability problems...
Anil Madhavapeddy, Alex Ho, Tim Deegan, David Scot...
OOPSLA
2007
Springer
15 years 10 months ago
Modular typestate checking of aliased objects
Objects often define usage protocols that clients must follow in order for these objects to work properly. Aliasing makes it notoriously difficult to check whether clients and i...
Kevin Bierhoff, Jonathan Aldrich
124
Voted
SIGUCCS
2003
ACM
15 years 9 months ago
Putting OSX in an open access lab: (or "The Joy of X")
This paper discusses the challenges of putting Apple Macintosh OSX into open access and computer lab environments. Categories and Subject Descriptors K.6.4 [Management of Computin...
David L. R. Houston
INFSOF
2002
95views more  INFSOF 2002»
15 years 3 months ago
Semantic and behavioral library transformations
While software methodology encourages the use of libraries and advocates architectures of layered libraries, in practice the composition of libraries is not always seamless and th...
Sibylle Schupp, Douglas Gregor, David R. Musser, S...