Sciweavers

4469 search results - page 889 / 894
» Dynamic Program Slicing
Sort
View
USS
2010
13 years 5 months ago
Toward Automated Detection of Logic Vulnerabilities in Web Applications
Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, ...
Viktoria Felmetsger, Ludovico Cavedon, Christopher...
ICRA
2009
IEEE
116views Robotics» more  ICRA 2009»
13 years 5 months ago
Multi-vehicle path coordination in support of communication
Abstract-- This paper presents a framework for generating time-optimal velocity profiles for a group of pathconstrained vehicle robots that have fixed and known initial and goal lo...
Pramod Abichandani, Hande Y. Benson, Moshe Kam
CONCURRENCY
2010
172views more  CONCURRENCY 2010»
13 years 4 months ago
Modeling of tsunami waves and atmospheric swirling flows with graphics processing unit (GPU) and radial basis functions (RBF)
The faster growth curves in the speed of GPUs relative to CPUs in the past decade and its rapidly gained popularity have spawned a new area of development in computational technol...
Jessica Schmidt, Cécile Piret, Nan Zhang, B...
IJSSE
2010
80views more  IJSSE 2010»
13 years 4 months ago
Improving Memory Management Security for C and C++
Memory managers are an important part of any modern language: they are used to dynamically allocate memory for use in the program. Many managers exist and depending on the operati...
Yves Younan, Wouter Joosen, Frank Piessens, Hans V...
AOSD
2011
ACM
13 years 2 months ago
Closure joinpoints: block joinpoints without surprises
Block joinpoints allow programmers to explicitly mark regions of base code as “to be advised”, thus avoiding the need to extract the block into a method just for the sake of c...
Eric Bodden