Sciweavers

1407 search results - page 261 / 282
» The Use of Overloading in Java Programs
Sort
View
CONCURRENCY
2002
122views more  CONCURRENCY 2002»
13 years 7 months ago
The Grid Portal Development Kit
Computational science portals are emerging as useful and necessary interfaces for performing operations on the Grid. The Grid Portal Development Kit (GPDK) facilitates the develop...
Jason Novotny
TEC
2002
166views more  TEC 2002»
13 years 7 months ago
An artificial immune system architecture for computer security applications
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect ...
Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch,...
ICST
2010
IEEE
13 years 6 months ago
Precisely Detecting Runtime Change Interactions for Evolving Software
Abstract—Developers often make multiple changes to software. These changes are introduced to work cooperatively or to accomplish separate goals. However, changes might not intera...
Raúl A. Santelices, Mary Jean Harrold, Ales...
SEKE
2010
Springer
13 years 5 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
SPIN
2010
Springer
13 years 5 months ago
Analysing Mu-Calculus Properties of Pushdown Systems
Pushdown systems provide a natural model of software with recursive procedure calls. We provide a tool implementing an algorithm for computing the winning regions of a pushdown par...
Matthew Hague, C.-H. Luke Ong