Sciweavers

1601 search results - page 123 / 321
» The affordable application of formal methods to software eng...
Sort
View
TKDE
2012
227views Formal Methods» more  TKDE 2012»
11 years 11 months ago
Publishing Search Logs - A Comparative Study of Privacy Guarantees
—Search engine companies collect the “database of intentions”, the histories of their users’ search queries. These search logs are a gold mine for researchers. Search engin...
Michaela Götz, Ashwin Machanavajjhala, Guozha...
POPL
2006
ACM
14 years 9 months ago
The essence of command injection attacks in web applications
Web applications typically interact with a back-end database to retrieve persistent data and then present the data to the user as dynamically generated output, such as HTML web pa...
Zhendong Su, Gary Wassermann
CATA
2003
13 years 10 months ago
More Accurate Semantics Defining Constraint Combination for Software Systems Having Client-Server Relationships
In this paper we present a new method of combining multiple precedence constraints for a single task to support software systems having client-server relationships. In these types...
Kenneth G. Ricks, David Jeff Jackson, B. Earl Well...
SIGSOFT
2010
ACM
13 years 7 months ago
Scalable SMT-based verification of GPU kernel functions
Interest in Graphical Processing Units (GPUs) is skyrocketing due to their potential to yield spectacular performance on many important computing applications. Unfortunately, writ...
Guodong Li, Ganesh Gopalakrishnan
EDBTW
2010
Springer
14 years 4 months ago
Quantile-based bootstrap methods to generate continuous synthetic data
To face the increasing demand from users, National Statistical Institutes (NSI) release different information products. The dissemination of this information should be performed ...
Daniela Ichim