Sciweavers

1821 search results - page 292 / 365
» Security-Aware Program Transformations
Sort
View
ECLIPSE
2006
ACM
14 years 2 months ago
XPlainer-Eclipse: explaining XPath within Eclipse
The popularity of XML has motivated the development of novel XML processing tools many of which embed the XPath language for XML querying, transformation, constraint specificatio...
John W. S. Liu, Mariano P. Consens, Flavio Rizzolo
CGO
2005
IEEE
14 years 2 months ago
Reactive Techniques for Controlling Software Speculation
Aggressive software speculation holds significant potential, because it enables program transformations to reduce the program’s critical path. Like any form of speculation, how...
Craig B. Zilles, Naveen Neelakantam
WCRE
2005
IEEE
14 years 2 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean
SIGITE
2005
ACM
14 years 2 months ago
Teaching 2D arrays using real-time video filters
Educators have long been trying to spice things up in their introductory programming courses. Traditionally, twodimensional arrays have been taught non-graphically using contrived...
Jeffrey W. Chastine, Jon A. Preston
CC
2005
Springer
123views System Software» more  CC 2005»
14 years 2 months ago
XML Goes Native: Run-Time Representations for Xtatic
Abstract. Xtatic is a lightweight extension of C offering native support for statically typed XML processing. XML trees are built-in values in Xtatic, and static analysis of the t...
Vladimir Gapeyev, Michael Y. Levin, Benjamin C. Pi...