Sciweavers

236 search results - page 24 / 48
» Can You Trust Software Capability Evaluations
Sort
View
SIGSOFT
2008
ACM
14 years 10 months ago
Javert: fully automatic mining of general temporal properties from dynamic traces
Program specifications are important for many tasks during software design, development, and maintenance. Among these, temporal specifications are particularly useful. They expres...
Mark Gabel, Zhendong Su
WWW
2008
ACM
14 years 10 months ago
SMash: secure component model for cross-domain mashups on unmodified browsers
Mashup applications mix and merge content (data and code) from multiple content providers in a user's browser, to provide high-value web applications that can rival the user ...
Frederik De Keukelaere, Sumeer Bhola, Michael Stei...
ICSE
1999
IEEE-ACM
14 years 2 months ago
Exploiting ADLs to Specify Architectural Styles Induced by Middleware Infrastructures
Architecture Definition Languages (ADLs) enable the formalization of the architecture of software systems and the execution of preliminary analyses on them. These analyses aim at...
Elisabetta Di Nitto, David S. Rosenblum
CODES
2005
IEEE
14 years 3 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
SRDS
2006
IEEE
14 years 3 months ago
WRAPS: Denial-of-Service Defense through Web Referrals
The web is a complicated graph, with millions of websites interlinked together. In this paper, we propose to use this web sitegraph structure to mitigate flooding attacks on a we...
XiaoFeng Wang, Michael K. Reiter