Sciweavers

2572 search results - page 469 / 515
» codes 2008
Sort
View
100
Voted
CORR
2008
Springer
111views Education» more  CORR 2008»
15 years 26 days ago
XML Rewriting Attacks: Existing Solutions and their Limitations
Web Services are web-based applications made available for web users or remote Web-based programs. In order to promote interoperability, they publish their interfaces in the so-ca...
Azzedine Benameur, Faisal Abdul Kadir, Serge Fenet
118
Voted
ISCA
2008
IEEE
136views Hardware» more  ISCA 2008»
15 years 24 days ago
The Design and Performance of a Bare PC Web Server
There is an increasing need for new Web server architectures that are application-centric, simple, small, and pervasive in nature. In this paper, we present a novel architecture f...
Long He, Ramesh K. Karne, Alexander L. Wijesinha
88
Voted
SIGCSE
2008
ACM
150views Education» more  SIGCSE 2008»
15 years 21 days ago
Backstop: a tool for debugging runtime errors
The errors that Java programmers are likely to encounter can roughly be categorized into three groups: compile-time (semantic and syntactic), logical, and runtime (exceptions). Wh...
Christian Murphy, Eunhee Kim, Gail E. Kaiser, Adam...
SIGCSE
2008
ACM
131views Education» more  SIGCSE 2008»
15 years 21 days ago
Compiler error messages: what can help novices?
Novices find it difficult to understand and use compiler error messages. It is useful to refine this observation and study the effect of different message styles on how well and q...
Marie-Hélène Nienaltowski, Michela P...
SOCO
2008
Springer
15 years 21 days ago
Component-Based Access Control: Secure Software Composition through Static Analysis
Abstract. Extensible Component Platforms support the discovery, installation, starting, uninstallation of components at runtime. Since they are often targeted at mobile resource-co...
Pierre Parrend, Stéphane Frénot