Sciweavers

3792 search results - page 727 / 759
» Techniques for Trusted Software Engineering
Sort
View
89
Voted
CHI
2007
ACM
16 years 25 days ago
What happened to remote usability testing?: an empirical study of three methods
The idea of conducting usability tests remotely emerged ten years ago. Since then, it has been studied empirically, and some software organizations employ remote methods. Yet ther...
Henrik Villemann Nielsen, Jan Stage, Morten Sieker...
214
Voted
POPL
2008
ACM
16 years 22 days ago
Relational inductive shape analysis
alyses are concerned with precise abstractions of the heap to capture detailed structural properties. To do so, they need to build and decompose summaries of disjoint memory regio...
Bor-Yuh Evan Chang, Xavier Rival
239
Voted
POPL
2006
ACM
16 years 22 days ago
The essence of command injection attacks in web applications
Web applications typically interact with a back-end database to retrieve persistent data and then present the data to the user as dynamically generated output, such as HTML web pa...
Zhendong Su, Gary Wassermann
221
Voted
POPL
2003
ACM
16 years 22 days ago
Discovering affine equalities using random interpretation
We present a new polynomial-time randomized algorithm for discovering affine equalities involving variables in a program. The key idea of the algorithm is to execute a code fragme...
Sumit Gulwani, George C. Necula
79
Voted
EUROSYS
2010
ACM
15 years 9 months ago
A Comprehensive Scheduler for Asymmetric Multicore Systems
Symmetric-ISA (instruction set architecture) asymmetricperformance multicore processors were shown to deliver higher performance per watt and area for codes with diverse architect...
Juan Carlos Saez, Manuel Prieto Matias, Alexandra ...