Sciweavers

682 search results - page 74 / 137
» Java Implementation Verification Using Reverse Engineering
Sort
View
ICSE
2008
IEEE-ACM
14 years 8 months ago
Static detection of cross-site scripting vulnerabilities
Web applications support many of our daily activities, but they often have security problems, and their accessibility makes them easy to exploit. In cross-site scripting (XSS), an...
Gary Wassermann, Zhendong Su
FATES
2006
Springer
13 years 11 months ago
Goldilocks: Efficiently Computing the Happens-Before Relation Using Locksets
We present a new lockset-based algorithm, Goldilocks, for precisely computing the happens-before relation and thereby detecting data-races at runtime. Dynamic race detection algori...
Tayfun Elmas, Shaz Qadeer, Serdar Tasiran
ICFCA
2007
Springer
13 years 11 months ago
Performances of Galois Sub-hierarchy-building Algorithms
Abstract. The Galois Sub-hierarchy (GSH) is a polynomial-size representation of a concept lattice which has been applied to several fields, such as software engineering and linguis...
Gabriela Arévalo, Anne Berry, Marianne Huch...
APSEC
2006
IEEE
14 years 1 months ago
An Accurate and Convenient Undo Mechanism for Refactorings
Refactoring makes existing source code more understandable and reusable without changing observable behavior. Therefore, applying refactorings to existing source code and reversin...
Katsuhisa Maruyama
WCRE
2005
IEEE
14 years 1 months ago
Semantic Navigation of Large Code Bases in Higher-Order, Dynamically Typed Languages
— Chuck is a new code browser that allows navigation of a code base along semantic structures, such as data-flow and higher-order control-flow relationships. Employing the fast...
S. Alexander Spoon, Olin Shivers