Sciweavers

1489 search results - page 40 / 298
» The First Bug Report
Sort
View
USS
2008
15 years 6 months ago
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking
Cross-site scripting (XSS) and SQL injection errors are two prominent examples of taint-based vulnerabilities that have been responsible for a large number of security breaches in...
Michael C. Martin, Monica S. Lam
OOPSLA
2010
Springer
15 years 1 months ago
Composable specifications for structured shared-memory communication
In this paper we propose a communication-centric approach to specifying and checking how multithreaded programs use shared memory to perform inter-thread communication. Our approa...
Benjamin P. Wood, Adrian Sampson, Luis Ceze, Dan G...
HOTNETS
2010
14 years 10 months ago
Diagnosing mobile applications in the wild
There are a lot of applications that run on modern mobile operating systems. Inevitably, some of these applications fail in the hands of users. Diagnosing a failure to identify the...
Sharad Agarwal, Ratul Mahajan, Alice Zheng, Victor...
COMPGEOM
2010
ACM
15 years 8 months ago
Orthogonal range reporting: query lower bounds, optimal structures in 3-d, and higher-dimensional improvements
Orthogonal range reporting is the problem of storing a set of n points in d-dimensional space, such that the k points in an axis-orthogonal query box can be reported efficiently. ...
Peyman Afshani, Lars Arge, Kasper Dalgaard Larsen
ACE
2003
86views Education» more  ACE 2003»
15 years 5 months ago
A New Approach to a First Year Undergraduate Information Systems Course
This paper describes the development, implementation and evaluation of a new teaching approach for a large first year undergraduate course in information systems at the University...
Denise Tolhurst, Bob Baker