Sciweavers

3889 search results - page 646 / 778
» The Use of Program Dependence Graphs in Software Engineering
Sort
View
PLDI
2009
ACM
15 years 10 months ago
TAJ: effective taint analysis of web applications
Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods and parameters may flow into security-sensitive operations. Taint analysis...
Omer Tripp, Marco Pistoia, Stephen J. Fink, Manu S...
UIST
2006
ACM
15 years 9 months ago
RecipeSheet: creating, combining and controlling information processors
Many tasks require users to extract information from diverse sources, to edit or process this information locally, and to explore how the end results are affected by changes in th...
Aran Lunzer, Kasper Hornbæk
BIRTHDAY
2006
Springer
15 years 7 months ago
Verification by Parallelization of Parametric Code
Abstract. Loops and other unbound control structures constitute a major bottleneck in formal software verification, because correctness proofs over such control structures generall...
Tobias Gedell, Reiner Hähnle
HICSS
2003
IEEE
162views Biometrics» more  HICSS 2003»
15 years 9 months ago
Decision Support Models for Composing and Navigating through e-Learning Objects
Libraries of learning objects may serve as basis for deriving course offerings that are customized to the needs of different learning communities or even individuals. Several ways...
Gerhard Knolmayer
135
Voted
ICST
2009
IEEE
15 years 10 months ago
Predicting Attack-prone Components
GEGICK, MICHAEL CHARLES. Predicting Attack-prone Components with Source Code Static Analyzers. (Under the direction of Laurie Williams). No single vulnerability detection techniqu...
Michael Gegick, Pete Rotella, Laurie A. Williams