Sciweavers

39 search results - page 4 / 8
» A Software Library for SyncML Server Applications
Sort
View
155
Voted
ICSE
2012
IEEE-ACM
13 years 5 months ago
Predicting performance via automated feature-interaction detection
Abstract—Customizable programs and program families provide user-selectable features to allow users to tailor a program to an application scenario. Knowing in advance which featu...
Norbert Siegmund, Sergiy S. Kolesnikov, Christian ...
125
Voted
ASPLOS
2006
ACM
15 years 6 months ago
Comprehensively and efficiently protecting the heap
The goal of this paper is to propose a scheme that provides comprehensive security protection for the heap. Heap vulnerabilities are increasingly being exploited for attacks on co...
Mazen Kharbutli, Xiaowei Jiang, Yan Solihin, Guru ...
118
Voted
EUROSYS
2008
ACM
15 years 11 months ago
Samurai: protecting critical data in unsafe languages
Programs written in type-unsafe languages such as C and C++ incur costly memory errors that result in corrupted data structures, program crashes, and incorrect results. We present...
Karthik Pattabiraman, Vinod Grover, Benjamin G. Zo...
120
Voted
ENTCS
2002
145views more  ENTCS 2002»
15 years 2 months ago
Combining Monitors for Runtime System Verification
Runtime verification permits checking system properties that cannot be fully verified off-line. This is particularly true when the system includes complex third-party components, ...
Joshua Levy, Hassen Saïdi, Tomás E. Ur...
125
Voted
SIGSOFT
2008
ACM
16 years 3 months ago
The implications of method placement on API learnability
To better understand what makes Application Programming Interfaces (APIs) hard to use and how to improve them, recent research has begun studying programmers' strategies and ...
Jeffrey Stylos, Brad A. Myers