Sciweavers

1011 search results - page 109 / 203
» Exception Analysis for Java
Sort
View
DIMVA
2010
13 years 11 months ago
Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners
Black-box web vulnerability scanners are a class of tools that can be used to identify security issues in web applications. These tools are often marketed as "point-and-click ...
Adam Doupé, Marco Cova, Giovanni Vigna
ECR
2006
107views more  ECR 2006»
13 years 10 months ago
Software watermarking via opaque predicates: Implementation, analysis, and attacks
Within the software industry software piracy is a great concern. In this article we address this issue through a prevention technique called software watermarking. Depending on ho...
Ginger Myles, Christian S. Collberg
JOT
2007
102views more  JOT 2007»
13 years 10 months ago
Type Access Analysis: Towards Informed Interface Design
Programs designed from scratch often start with just a set of classes. Classes can be instantiated and so deliver the objects that are the carriers of information and function. In...
Friedrich Steimann, Philip Mayer
SCAM
2007
IEEE
14 years 4 months ago
Extending Attribute Grammars with Collection Attributes--Evaluation and Applications
Collection attributes, as defined by Boyland, can be used as a mechanism for concisely specifying cross-referencelike properties such as callee sets, subclass sets, and sets of v...
Eva Magnusson, Torbjörn Ekman, Görel Hed...
SIAMAM
2002
102views more  SIAMAM 2002»
13 years 10 months ago
Relaxation Oscillations in a Class of Delay Differential Equations
We study a class of delay differential equations which have been used to model hematological stem cell regulation and dynamics. Under certain circumstances the model exhibits self-...
A. C. Fowler, Michael C. Mackey