Sciweavers

56 search results - page 7 / 12
» A framework for malicious workload generation
Sort
View
PLDI
2009
ACM
14 years 1 months ago
Staged information flow for javascript
Modern websites are powered by JavaScript, a flexible dynamic scripting language that executes in client browsers. A common paradigm in such websites is to include third-party Ja...
Ravi Chugh, Jeffrey A. Meister, Ranjit Jhala, Sori...
ICDE
2006
IEEE
198views Database» more  ICDE 2006»
14 years 8 months ago
Automating the Design and Construction of Query Forms
One of the simplest ways to query a database is through a form, where a user can fill in relevant information and obtain desired results by submitting the form. Designing good sta...
Magesh Jayapandian, H. V. Jagadish
ICSE
2004
IEEE-ACM
14 years 7 months ago
Elaborating Security Requirements by Construction of Intentional Anti-Models
Caring for security at requirements engineering time is a message that has finally received some attention recently. However, it is not yet very clear how to achieve this systemat...
Axel van Lamsweerde
AIRWEB
2007
Springer
14 years 1 months ago
Combating Spam in Tagging Systems
Tagging systems allow users to interactively annotate a pool of shared resources using descriptive tags. As tagging systems are gaining in popularity, they become more susceptible...
Georgia Koutrika, Frans Adjie Effendi, Zoltá...
ICDE
2006
IEEE
138views Database» more  ICDE 2006»
14 years 8 months ago
Automated Storage Management with QoS Guarantees
Automated storage management is critical for most dataintensive applications running on DBMSs. In large-scale storage subsystems, the workload is expected to vary with time. In or...
Lin Qiao, Balakrishna R. Iyer, Divyakant Agrawal, ...