Sciweavers

2897 search results - page 475 / 580
» Mobile Code Security
Sort
View
OOPSLA
2010
Springer
15 years 23 days ago
Ficticious: MicroLanguages for interactive fiction
In this paper we provide an experience report where language oriented programming approaches are applied to complex game design. Ficticious is a G-expression based pidgin of sever...
James Dean Palmer
OOPSLA
2010
Springer
15 years 23 days ago
Teaching and training developer-testing techniques and tool support
Developer testing is a type of testing where developers test their code as they write it, as opposed to testing done by a separate quality assurance organization. Developer testin...
Tao Xie, Jonathan de Halleux, Nikolai Tillmann, Wo...
OOPSLA
2010
Springer
15 years 7 days ago
A recommender for conflict resolution support in optimistic model versioning
The usage of optimistic version control systems comes along with cumbersome and time-consuming conflict resolution in the case that the modifications of two developers are contrad...
Petra Brosch, Martina Seidl, Gerti Kappel
CRYPTO
2012
Springer
219views Cryptology» more  CRYPTO 2012»
13 years 4 months ago
Tamper and Leakage Resilience in the Split-State Model
It is notoriously difficult to create hardware that is immune from side channel and tampering attacks. A lot of recent literature, therefore, has instead considered algorithmic de...
Feng-Hao Liu, Anna Lysyanskaya
SIGSOFT
2008
ACM
16 years 3 months ago
Marple: a demand-driven path-sensitive buffer overflow detector
Despite increasing efforts in detecting and managing software security vulnerabilities, the number of security attacks is still rising every year. As software becomes more complex...
Wei Le, Mary Lou Soffa