Sciweavers

578 search results - page 12 / 116
» Analysis of Programs with Exception-Handling Constructs
Sort
View
CCS
2011
ACM
12 years 7 months ago
WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction
Parameter tampering attacks are dangerous to a web application whose server fails to replicate the validation of user-supplied data that is performed by the client. Malicious user...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...
LREC
2010
150views Education» more  LREC 2010»
13 years 9 months ago
Constructing and Using Broad-coverage Lexical Resource for Enhancing Morphological Analysis of Arabic
Broad-coverage language resources which provide prior linguistic knowledge must improve the accuracy and the performance of NLP applications. We are constructing a broad-coverage ...
Majdi Sawalha, Eric Atwell
EUC
2004
Springer
14 years 26 days ago
Construction of Distributed Object Group Framework and Its Execution Analysis Using Distributed Application Simulation
The Distributed Object Group Framework(DOGF) we constructed supports the grouping of distributed objects that are required for distributed application. From the DOGF, we manage dis...
Chang-Sun Shin, Chang-Won Jeong, Su-Chong Joo
PLDI
1993
ACM
13 years 11 months ago
Dependence-Based Program Analysis
Program analysis and optimizationcan be speeded upthrough the use of the dependence flow graph (DFG), a representation of program dependences which generalizes def-use chains and...
Richard Johnson, Keshav Pingali
ICSM
2002
IEEE
14 years 12 days ago
Constructing Precise Object Relation Diagrams
The Object Relation Diagram (ORD) of a program is a class interdependence diagram which has applications in a wide variety of software engineering problems (e.g., integration test...
Ana Milanova, Atanas Rountev, Barbara G. Ryder