Sciweavers

1448 search results - page 188 / 290
» From Requirements to Code Revisited
Sort
View
139
Voted
ESORICS
2009
Springer
16 years 4 months ago
Isolating JavaScript with Filters, Rewriting, and Wrappers
Abstract. We study methods that allow web sites to safely combine JavaScript from untrusted sources. If implemented properly, filters can prevent dangerous code from loading into t...
Sergio Maffeis, John C. Mitchell, Ankur Taly
131
Voted
ICSE
2008
IEEE-ACM
16 years 3 months ago
Creating a cognitive metric of programming task difficulty
Conducting controlled experiments about programming activities often requires the use of multiple tasks of similar difficulty. In previously reported work about a controlled exper...
Brian de Alwis, Gail C. Murphy, Shawn Minto
ICCAD
2007
IEEE
123views Hardware» more  ICCAD 2007»
16 years 15 days ago
Mapping model with inter-array memory sharing for multidimensional signal processing
Abstract – The storage requirements in data-intensive signal processing systems (including applications in video and image processing, artificial vision, medical imaging, real-t...
Ilie I. Luican, Hongwei Zhu, Florin Balasa
129
Voted
ASPLOS
2009
ACM
15 years 10 months ago
Recovery domains: an organizing principle for recoverable operating systems
We describe a strategy for enabling existing commodity operating systems to recover from unexpected run-time errors in nearly any part of the kernel, including core kernel compone...
Andrew Lenharth, Vikram S. Adve, Samuel T. King
119
Voted
ISSTA
2009
ACM
15 years 10 months ago
An annotation assistant for interactive debugging of programs with common synchronization idioms
This paper explores an approach to improving the practical usability of static verification tools for debugging synchronization idioms. Synchronization idioms such as mutual excl...
Tayfun Elmas, Ali Sezgin, Serdar Tasiran, Shaz Qad...