Sciweavers

2335 search results - page 364 / 467
» Type Checking Type Classes
Sort
View
DSN
2006
IEEE
15 years 8 months ago
Dependability Analysis of Virtual Memory Systems
Recent research has shown that even modern hard disks have complex failure modes that do not conform to “failstop” operation. Disks exhibit partial failures like block access ...
Lakshmi N. Bairavasundaram, Andrea C. Arpaci-Dusse...
SP
2006
IEEE
234views Security Privacy» more  SP 2006»
15 years 8 months ago
Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)
The number and the importance of Web applications have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such applica...
Nenad Jovanovic, Christopher Krügel, Engin Ki...
SUTC
2006
IEEE
15 years 8 months ago
DTTC: Delay-Tolerant Trajectory Compression for Object Tracking Sensor Networks
Taking advantage of the delay tolerance for objects tracking sensor networks, we propose delay-tolerant trajectory compression (DTTC) technique, an efficient and accurate algorit...
Yingqi Xu, Wang-Chien Lee
VL
2006
IEEE
100views Visual Languages» more  VL 2006»
15 years 8 months ago
Mica: A Web-Search Tool for Finding API Components and Examples
Because software libraries are numerous and large, learning how to use them is a common and problematic task for experienced programmers and novices alike. Internet search engines...
Jeffrey Stylos, Brad A. Myers
NSPW
2006
ACM
15 years 8 months ago
Dark application communities
In considering new security paradigms, it is often worthwhile to anticipate the direction and nature of future attack paradigms. We identify a class of attacks based on the idea o...
Michael E. Locasto, Angelos Stavrou, Angelos D. Ke...