The area of clone detection has considerably evolved over the last decade, leading to approaches with better results, but at the same time using more elaborate algorithms and tool...
Consider the execution of a failing program as a sequence of program states. Each state induces the following state, up to the failure. Which variables and values of a program sta...
Frameworks such as J2EE are designed to simplify the process of developing enterprise applications by handling much of the complexity of concurrency, transaction, and persistence ...
Mukund Raghavachari, Darrell Reimer, Robert D. Joh...
This paper presents an approach to statically retrofit legacy servers with mechanisms for authorization policy enforcement. The approach is based upon the observation that securit...
Vinod Ganapathy, Dave King 0002, Trent Jaeger, Som...
Context has been applied to a broad range of domains and systems ranging from location-based tourist applications to motion capture. An area relatively under-represented in the li...
Robert Ashford, Philip Moore, Bin Hu, Mike Jackson...