Sciweavers

1412 search results - page 189 / 283
» The Value of Outsourced Software
Sort
View
CIDR
2011
224views Algorithms» more  CIDR 2011»
13 years 1 months ago
Transactional Intent
Data state in a data management system such as a database is the result of the transactions performed on that data management system. Approaches such as single-message transaction...
Shel Finkelstein, Thomas Heinzel, Rainer Brendle, ...
ESSOS
2011
Springer
13 years 1 months ago
SessionShield: Lightweight Protection against Session Hijacking
The class of Cross-site Scripting (XSS) vulnerabilities is the most prevalent security problem in the field of Web applications. One of the main attack vectors used in connection ...
Nick Nikiforakis, Wannes Meert, Yves Younan, Marti...
ICSE
2011
IEEE-ACM
13 years 1 months ago
Inference of field initialization
A raw object is partially initialized, with only some fields set to legal values. It may violate its object invariants, such as that a given field is non-null. Programs often ma...
Fausto Spoto, Michael D. Ernst
POPL
2011
ACM
13 years 28 days ago
Static analysis of interrupt-driven programs synchronized via the priority ceiling protocol
We consider programs for embedded real-time systems which use priority-driven preemptive scheduling with task priorities adjusted dynamically according to the immediate ceiling pr...
Martin D. Schwarz, Helmut Seidl, Vesal Vojdani, Pe...
CAV
2012
Springer
227views Hardware» more  CAV 2012»
12 years 16 days ago
Minimum Satisfying Assignments for SMT
Abstract. A minimum satisfying assignment of a formula is a minimumcost partial assignment of values to the variables in the formula that guarantees the formula is true. Minimum sa...
Isil Dillig, Thomas Dillig, Kenneth L. McMillan, A...