Sciweavers

9974 search results - page 1687 / 1995
» Software Interconnection Models
Sort
View
125
Voted
PLDI
2009
ACM
15 years 10 months ago
TAJ: effective taint analysis of web applications
Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods and parameters may flow into security-sensitive operations. Taint analysis...
Omer Tripp, Marco Pistoia, Stephen J. Fink, Manu S...
PLDI
2009
ACM
15 years 10 months ago
Analyzing recursive programs using a fixed-point calculus
We show that recursive programs where variables range over finite domains can be effectively and efficiently analyzed by describing the analysis algorithm using a formula in a ...
Salvatore La Torre, Parthasarathy Madhusudan, Genn...
136
Voted
LCTRTS
2009
Springer
15 years 10 months ago
Eliminating the call stack to save RAM
Most programming languages support a call stack in the programming model and also in the runtime system. We show that for applications targeting low-power embedded microcontroller...
Xuejun Yang, Nathan Cooprider, John Regehr
121
Voted
ICSM
2009
IEEE
15 years 10 months ago
What's hot and what's not: Windowed developer topic analysis
As development on a software project progresses, developers shift their focus between different topics and tasks many times. Managers and newcomer developers often seek ways of un...
Abram Hindle, Michael W. Godfrey, Richard C. Holt
112
Voted
INFOCOM
2009
IEEE
15 years 10 months ago
Wi-Sh: A Simple, Robust Credit Based Wi-Fi Community Network
— Wireless community networks, where users share wireless bandwidth is attracting tremendous interest from academia and industry. Companies such as FON have been successful in at...
Xin Ai, Vikram Srinivasan, Chen-Khong Tham
« Prev « First page 1687 / 1995 Last » Next »