Sciweavers

506 search results - page 81 / 102
» Where Is the Value in a Program Verifier
Sort
View
OOPSLA
2010
Springer
15 years 2 months ago
MetaFJig: a meta-circular composition language for Java-like classes
We propose a Java-like language where class denitions are rst class values, hence new classes can be derived from existing, rather than by a xed mechanism like inheritance, by e...
Marco Servetto, Elena Zucca
CORR
2011
Springer
177views Education» more  CORR 2011»
14 years 11 months ago
User Modeling Combining Access Logs, Page Content and Semantics
The paper proposes an approach to modeling users of large Web sites based on combining different data sources: access logs and content of the accessed pages are combined with sema...
Blaz Fortuna, Dunja Mladenic, Marko Grobelnik
PADL
2004
Springer
15 years 9 months ago
Symbolic Execution of Behavioral Requirements
Message Sequence Charts (MSC) have traditionally been used as a weak form of behavioral requirements in software design; they denote scenarios which may happen. Live Sequence Chart...
Tao Wang, Abhik Roychoudhury, Roland H. C. Yap, S....
POPL
2012
ACM
13 years 11 months ago
Multiple facets for dynamic information flow
JavaScript has become a central technology of the web, but it is also the source of many security problems, including cross-site scripting attacks and malicious advertising code. ...
Thomas H. Austin, Cormac Flanagan
POPL
2010
ACM
16 years 1 months ago
Contracts Made Manifest
Since Findler and Felleisen [2002] introduced higher-order contracts, many variants have been proposed. Broadly, these fall into two groups: some follow Findler and Felleisen in u...
Benjamin C. Pierce, Michael Greenberg, Stephanie W...