Sciweavers

506 search results - page 81 / 102
» Where Is the Value in a Program Verifier
Sort
View
OOPSLA
2010
Springer
14 years 11 months ago
MetaFJig: a meta-circular composition language for Java-like classes
We propose a Java-like language where class denitions are rst class values, hence new classes can be derived from existing, rather than by a xed mechanism like inheritance, by e...
Marco Servetto, Elena Zucca
113
Voted
CORR
2011
Springer
177views Education» more  CORR 2011»
14 years 7 months ago
User Modeling Combining Access Logs, Page Content and Semantics
The paper proposes an approach to modeling users of large Web sites based on combining different data sources: access logs and content of the accessed pages are combined with sema...
Blaz Fortuna, Dunja Mladenic, Marko Grobelnik
PADL
2004
Springer
15 years 5 months ago
Symbolic Execution of Behavioral Requirements
Message Sequence Charts (MSC) have traditionally been used as a weak form of behavioral requirements in software design; they denote scenarios which may happen. Live Sequence Chart...
Tao Wang, Abhik Roychoudhury, Roland H. C. Yap, S....
116
Voted
POPL
2012
ACM
13 years 8 months ago
Multiple facets for dynamic information flow
JavaScript has become a central technology of the web, but it is also the source of many security problems, including cross-site scripting attacks and malicious advertising code. ...
Thomas H. Austin, Cormac Flanagan
113
Voted
POPL
2010
ACM
15 years 10 months ago
Contracts Made Manifest
Since Findler and Felleisen [2002] introduced higher-order contracts, many variants have been proposed. Broadly, these fall into two groups: some follow Findler and Felleisen in u...
Benjamin C. Pierce, Michael Greenberg, Stephanie W...