Sciweavers

506 search results - page 93 / 102
» Where Is the Value in a Program Verifier
Sort
View
112
Voted
POPL
1992
ACM
15 years 4 months ago
A Compilation Method for ML-Style Polymorphic Record Calculi
Polymorphic record calculi have recently attracted much attention as a typed foundation for objectoriented programming. This is based on the fact that a function that selects a fi...
Atsushi Ohori
USS
2008
15 years 2 months ago
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking
Cross-site scripting (XSS) and SQL injection errors are two prominent examples of taint-based vulnerabilities that have been responsible for a large number of security breaches in...
Michael C. Martin, Monica S. Lam
105
Voted
GLOBECOM
2010
IEEE
14 years 10 months ago
Passively Controllable Smart Antennas
Abstract-- This work deals with devising a secure, powerefficient, beam-steerable and on-chip transmission system for wireless sensor networks. A passively controllable smart (PCS)...
Javad Lavaei, Aydin Babakhani, Ali Hajimiri, John ...
217
Voted
CSEE
2011
Springer
14 years 4 months ago
Pex4Fun: Teaching and learning computer science via social gaming
Pex4Fun (http://www.pexforfun.com/)from Microsoft Research is a web-based serious gaming environment for teaching computer science. Pex4Fun can be used to teach and learn computer...
Nikolai Tillmann, Jonathan de Halleux, Tao Xie
82
Voted
TLDI
2005
ACM
135views Formal Methods» more  TLDI 2005»
15 years 6 months ago
Types for describing coordinated data structures
Coordinated data structures are sets of (perhaps unbounded) data structures where the nodes of each structure may share types with the corresponding nodes of the other structures....
Michael F. Ringenburg, Dan Grossman