Sciweavers

1179 search results - page 229 / 236
» Programming in Hybrid Constraint Languages
Sort
View
ICOODB
2009
163views Database» more  ICOODB 2009»
13 years 5 months ago
Mapping XSD to OO Schemas
This paper presents algorithms that make it possible to process XML data that conforms to XML Schema (XSD) in a mainstream object-oriented programming language. These algorithms a...
Suad Alagic, Philip A. Bernstein
CCS
2011
ACM
12 years 7 months ago
WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction
Parameter tampering attacks are dangerous to a web application whose server fails to replicate the validation of user-supplied data that is performed by the client. Malicious user...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...
CGO
2010
IEEE
14 years 2 months ago
Integrated instruction selection and register allocation for compact code generation exploiting freeform mixing of 16- and 32-bi
For memory constrained embedded systems code size is at least as important as performance. One way of increasing code density is to exploit compact instruction formats, e.g. ARM T...
Tobias J. K. Edler von Koch, Igor Böhm, Bj&ou...
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
14 years 1 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
ECOOP
2005
Springer
14 years 1 months ago
The Role of Design Information in Software Evolution
Software modeling has received a lot a of attention in the last decade and now is an important support for the design process. Actually, the design process is very important to the...
Walter Cazzola, Sonia Pini, Massimo Ancona