Sciweavers

3827 search results - page 547 / 766
» The Epsilon Generation Language
Sort
View
SP
2010
IEEE
182views Security Privacy» more  SP 2010»
14 years 2 months ago
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)
—Dynamic taint analysis and forward symbolic execution are quickly becoming staple techniques in security analyses. Example applications of dynamic taint analysis and forward sym...
Edward J. Schwartz, Thanassis Avgerinos, David Bru...
EDBT
2009
ACM
144views Database» more  EDBT 2009»
14 years 2 months ago
Efficient maintenance techniques for views over active documents
Many Web applications are based on dynamic interactions between Web components exchanging flows of information. Such a situation arises for instance in mashup systems or when moni...
Serge Abiteboul, Pierre Bourhis, Bogdan Marinoiu
FASE
2009
Springer
14 years 2 months ago
Mining API Error-Handling Specifications from Source Code
Abstract. API error-handling specifications are often not documented, necessitating automated specification mining. Automated mining of error-handling specifications is challenging...
Mithun Acharya, Tao Xie
EDBTW
2006
Springer
14 years 2 months ago
Using Temporal Semantics for Live Media Stream Queries
Querying live media streams is a challenging problem that becomes an essential requirement in a growing number of applications. We address the problem of evaluating continuous quer...
Bin Liu, Amarnath Gupta, Ramesh Jain
DAC
1995
ACM
14 years 2 months ago
Synthesis of Software Programs for Embedded Control Applications
— Software components for embedded reactive real-time applications must satisfy tight code size and runtime constraints. Cooperating finite state machines provide a convenient i...
Massimiliano Chiodo, Paolo Giusto, Attila Jurecska...