Sciweavers

5488 search results - page 992 / 1098
» On the Secure Implementation of Security Protocols
Sort
View
OOPSLA
2010
Springer
15 years 3 months ago
Supporting dynamic, third-party code customizations in JavaScript using aspects
Web sites and web browsers have recently evolved into platforms on top of which entire applications are delivered dynamically, mostly as JavaScript source code. This delivery form...
Benjamin S. Lerner, Herman Venter, Dan Grossman
OOPSLA
2010
Springer
15 years 3 months ago
Hera-JVM: a runtime system for heterogeneous multi-core architectures
Heterogeneous multi-core processors, such as the IBM Cell processor, can deliver high performance. However, these processors are notoriously difficult to program: different cores...
Ross McIlroy, Joe Sventek
142
Voted
OOPSLA
2010
Springer
15 years 3 months ago
G-Finder: routing programming questions closer to the experts
Programming forums are becoming the primary tools for programmers to find answers for their programming problems. Our empirical study of popular programming forums shows that the...
Wei Li, Charles Zhang, Songlin Hu
CODASPY
2012
14 years 10 days ago
Detecting repackaged smartphone applications in third-party android marketplaces
Recent years have witnessed incredible popularity and adoption of smartphones and mobile devices, which is accompanied by large amount and wide variety of feature-rich smartphone ...
Wu Zhou, Yajin Zhou, Xuxian Jiang, Peng Ning
141
Voted
WWW
2009
ACM
16 years 5 months ago
A trust management framework for service-oriented environments
Many reputation management systems have been developed under the assumption that each entity in the system will use a variant of the same scoring function. Much of the previous wo...
William Conner, Arun Iyengar, Thomas A. Mikalsen, ...