Sciweavers

191 search results - page 31 / 39
» Specifying and Reasoning About Dynamic Access-Control Polici...
Sort
View
CCS
2010
ACM
14 years 11 months ago
An empirical study of privacy-violating information flows in JavaScript web applications
The dynamic nature of JavaScript web applications has given rise to the possibility of privacy violating information flows. We present an empirical study of the prevalence of such...
Dongseok Jang, Ranjit Jhala, Sorin Lerner, Hovav S...
97
Voted
KBSE
1999
IEEE
15 years 3 months ago
AML: An Architecture Meta-Language
The language AML is used to specify the semantics of architecture description languages, ADLs. It is a very primitive language, having declarations for only three constructs: elem...
David S. Wile
AIPS
2009
15 years 22 days ago
Flexible Execution of Plans with Choice
Dynamic plan execution strategies allow an autonomous agent to respond to uncertainties while improving robustness and reducing the need for an overly conservative plan. Executive...
Patrick R. Conrad, Julie A. Shah, Brian C. William...
IUI
2006
ACM
15 years 5 months ago
Who's asking for help?: a Bayesian approach to intelligent assistance
Automated software customization is drawing increasing attention as a means to help users deal with the scope, complexity, potential intrusiveness, and ever-changing nature of mod...
Bowen Hui, Craig Boutilier
KBSE
2010
IEEE
14 years 10 months ago
Solving string constraints lazily
Decision procedures have long been a fixture in program analysis, and reasoning about string constraints is a key element in many program analyses and testing frameworks. Recent ...
Pieter Hooimeijer, Westley Weimer