Sciweavers

1943 search results - page 372 / 389
» Web application security engineering
Sort
View
OOPSLA
2005
Springer
15 years 3 months ago
Relational queries over program traces
Instrumenting programs with code to monitor runtime behavior is a common technique for profiling and debugging. In practice, instrumentation is either inserted manually by progra...
Simon Goldsmith, Robert O'Callahan, Alexander Aike...
VLDB
2004
ACM
100views Database» more  VLDB 2004»
15 years 3 months ago
Resilient Rights Protection for Sensor Streams
Today’s world of increasingly dynamic computing environments naturally results in more and more data being available as fast streams. Applications such as stock market analysis,...
Radu Sion, Mikhail J. Atallah, Sunil Prabhakar
HOTOS
2003
IEEE
15 years 2 months ago
Palimpsest: Soft-Capacity Storage for Planetary-Scale Services
Distributed writable storage systems typically provide NFS-like semantics and unbounded persistence for files. We claim that for planetary-scale distributed services such facilit...
Timothy Roscoe, Steven Hand
POPL
1998
ACM
15 years 1 months ago
A Type System for Java Bytecode Subroutines
Java is typically compiled into an intermediate language, JVML, that is interpreted by the Java Virtual Machine. Because mobile JVML code is not always trusted, a bytecode verifi...
Raymie Stata, Martín Abadi
CSREASAM
2008
14 years 11 months ago
On Providing Automatic Parental Consent over Information Collection from Children
: Children's privacy has become critical with the increasing use of the Internet for commercial purposes and corresponding increase in requests for information. 65% of childre...
Karthik Channakeshava, Kaigui Bian, Michael S. Hsi...