Sciweavers

6941 search results - page 1386 / 1389
» Testing as a Certification Approach
Sort
View
SIGMOD
2011
ACM
170views Database» more  SIGMOD 2011»
12 years 10 months ago
Warding off the dangers of data corruption with amulet
Occasional corruption of stored data is an unfortunate byproduct of the complexity of modern systems. Hardware errors, software bugs, and mistakes by human administrators can corr...
Nedyalko Borisov, Shivnath Babu, NagaPramod Mandag...
ATAL
2011
Springer
12 years 7 months ago
A computational model of achievement motivation for artificial agents
Computational models of motivation are tools that artificial agents can use to autonomously identify, prioritize, and select the goals they will pursue. Previous research has focu...
Kathryn Elizabeth Merrick
CASES
2011
ACM
12 years 7 months ago
Cost-effective safety and fault localization using distributed temporal redundancy
Cost pressure is driving vendors of safety-critical systems to integrate previously distributed systems. One natural approach we have previous introduced is On-Demand Redundancy (...
Brett H. Meyer, Benton H. Calhoun, John Lach, Kevi...
CCS
2011
ACM
12 years 7 months ago
Fear the EAR: discovering and mitigating execution after redirect vulnerabilities
The complexity of modern web applications makes it difficult for developers to fully understand the security implications of their code. Attackers exploit the resulting security v...
Adam Doupé, Bryce Boe, Christopher Kruegel,...
CCS
2011
ACM
12 years 7 months ago
SCRIPTGARD: automatic context-sensitive sanitization for large-scale legacy web applications
We empirically analyzed sanitizer use in a shipping web application with over 400,000 lines of code and over 23,244 methods, the largest empirical analysis of sanitizer use of whi...
Prateek Saxena, David Molnar, Benjamin Livshits
« Prev « First page 1386 / 1389 Last » Next »