Sciweavers

1011 search results - page 149 / 203
» Exception Analysis for Java
Sort
View
JOT
2010
113views more  JOT 2010»
13 years 8 months ago
SOA Web Security and Applications
entional vulnerability detection fails to extend its generic form to an abstract level in coping with particular type of string validation. Consequently the security bypasses key ...
Raymond Wu, Masayuki Hisada
NOTERE
2010
13 years 8 months ago
The Design of a Real-Time Event Manager Component
Abstract—We review the issues with the conception of realtime event based applications and propose an event manager component design. We start from the design proposed by the Rea...
Damien Masson, Serge Midonnet
RV
2010
Springer
153views Hardware» more  RV 2010»
13 years 7 months ago
Run-Time Verification of Networked Software
Most applications that are in use today inter-operate with other applications, so-called peers, over a network. The analysis of such distributed applications requires that the effe...
Cyrille Valentin Artho
WWW
2007
ACM
14 years 10 months ago
Expertise networks in online communities: structure and algorithms
Web-based communities have become important places for people to seek and share expertise. We find that networks in these communities typically differ in their topology from other...
Jun Zhang, Mark S. Ackerman, Lada A. Adamic
OOPSLA
2004
Springer
14 years 3 months ago
The garbage collection advantage: improving program locality
As improvements in processor speed continue to outpace improvements in cache and memory speed, poor locality increasingly degrades performance. Because copying garbage collectors ...
Xianglong Huang, Stephen M. Blackburn, Kathryn S. ...