Sciweavers

164 search results - page 15 / 33
» Application Intrusion Detection using Language Library Calls
Sort
View
CINQ
2004
Springer
189views Database» more  CINQ 2004»
14 years 26 days ago
Employing Inductive Databases in Concrete Applications
In this paper we present the application of the inductive database approach to two practical analytical case studies: Web usage mining in Web logs and financial data. As far as co...
Rosa Meo, Pier Luca Lanzi, Maristella Matera, Dani...
IPPS
2003
IEEE
14 years 23 days ago
Wrapping Legacy Codes for Grid-Based Applications
This paper describes a process for the semi-automatic conversion of numerical and scientific routines written in the C programming language into Triana-based computational servic...
Yan Huang, Ian Taylor, David W. Walker, Robert Dav...
KBSE
2008
IEEE
14 years 1 months ago
SpotWeb: Detecting Framework Hotspots and Coldspots via Mining Open Source Code on the Web
—Software developers often face challenges in reusing open source frameworks due to several factors such as the framework complexity and lack of proper documentation. In this pap...
Suresh Thummalapenta, Tao Xie
VEE
2012
ACM
226views Virtualization» more  VEE 2012»
12 years 3 months ago
Protecting applications against TOCTTOU races by user-space caching of file metadata
Time Of Check To Time Of Use (TOCTTOU) race conditions for file accesses in user-space applications are a common problem in Unix-like systems. The mapping between filename and i...
Mathias Payer, Thomas R. Gross
VL
2010
IEEE
218views Visual Languages» more  VL 2010»
13 years 5 months ago
Using Association Metrics to Help Users Navigate API Documentation
-- In the past decade there has been spectacular growth in the number and size of third-party libraries, frameworks, toolkits and other Application Programming Interfaces (APIs) av...
Daniel S. Eisenberg, Jeffrey Stylos, Andrew Faulri...