Sciweavers

1748 search results - page 310 / 350
» Using Aspect Programming to Secure Web Applications
Sort
View
WWW
2009
ACM
16 years 2 months ago
Releasing search queries and clicks privately
The question of how to publish an anonymized search log was brought to the forefront by a well-intentioned, but privacy-unaware AOL search log release. Since then a series of ad-h...
Aleksandra Korolova, Krishnaram Kenthapadi, Nina M...
ISSTA
2009
ACM
15 years 8 months ago
HAMPI: a solver for string constraints
Many automatic testing, analysis, and verification techniques for programs can be effectively reduced to a constraint-generation phase followed by a constraint-solving phase. Th...
Adam Kiezun, Vijay Ganesh, Philip J. Guo, Pieter H...
OOPSLA
2009
Springer
15 years 8 months ago
Scalable nonblocking concurrent objects for mission critical code
The high degree of complexity and autonomy of future robotic space missions, such as Mars Science Laboratory (MSL), poses serious challenges in assuring their reliability and ef...
Damian Dechev, Bjarne Stroustrup
GPCE
2005
Springer
15 years 7 months ago
Applying a Generative Technique for Enhanced Genericity and Maintainability on the J2EE Platform
One of the themes in building reusable and maintainable software is identifying similarities and designing generic solutions to unify similarity patterns. In this paper, we analyze...
Yang Jun, Stan Jarzabek
ICSE
2004
IEEE-ACM
16 years 1 months ago
GlueQoS: Middleware to Sweeten Quality-of-Service Policy Interactions
A holy grail of component-based software engineering is "write-once, reuse everywhere". However, in modern distributed, component-based systems supporting emerging appli...
Eric Wohlstadter, Stefan Tai, Thomas A. Mikalsen, ...