Sciweavers

2272 search results - page 128 / 455
» Validity Invariants and Effects
Sort
View
CORR
2004
Springer
177views Education» more  CORR 2004»
13 years 10 months ago
Typestate Checking and Regular Graph Constraints
We introduce regular graph constraints and explore their decidability properties. The motivation for regular graph constraints is 1) type checking of changing types of objects in ...
Viktor Kuncak, Martin C. Rinard
ICSE
2008
IEEE-ACM
14 years 11 months ago
Static detection of cross-site scripting vulnerabilities
Web applications support many of our daily activities, but they often have security problems, and their accessibility makes them easy to exploit. In cross-site scripting (XSS), an...
Gary Wassermann, Zhendong Su
PLDI
2009
ACM
14 years 5 months ago
Proving optimizations correct using parameterized program equivalence
Translation validation is a technique for checking that, after an optimization has run, the input and output of the optimization are equivalent. Traditionally, translation validat...
Sudipta Kundu, Zachary Tatlock, Sorin Lerner
EDBT
2009
ACM
120views Database» more  EDBT 2009»
14 years 5 months ago
Retrieving meaningful relaxed tightest fragments for XML keyword search
Adapting keyword search to XML data has been attractive recently, generalized as XML keyword search (XKS). One of its key tasks is to return the meaningful fragments as the result...
Lingbo Kong, Rémi Gilleron, Aurélien...
TSE
2008
92views more  TSE 2008»
13 years 10 months ago
Evaluating Test Suites and Adequacy Criteria Using Simulation-Based Models of Distributed Systems
Test adequacy criteria provide the engineer with guidance on how to populate test suites. While adequacy criteria have long been a focus of research, existing testing methods do no...
Matthew J. Rutherford, Antonio Carzaniga, Alexande...