Sciweavers

506 search results - page 93 / 102
» Where Is the Value in a Program Verifier
Sort
View
POPL
1992
ACM
13 years 11 months ago
A Compilation Method for ML-Style Polymorphic Record Calculi
Polymorphic record calculi have recently attracted much attention as a typed foundation for objectoriented programming. This is based on the fact that a function that selects a fi...
Atsushi Ohori
USS
2008
13 years 9 months ago
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking
Cross-site scripting (XSS) and SQL injection errors are two prominent examples of taint-based vulnerabilities that have been responsible for a large number of security breaches in...
Michael C. Martin, Monica S. Lam
GLOBECOM
2010
IEEE
13 years 5 months ago
Passively Controllable Smart Antennas
Abstract-- This work deals with devising a secure, powerefficient, beam-steerable and on-chip transmission system for wireless sensor networks. A passively controllable smart (PCS)...
Javad Lavaei, Aydin Babakhani, Ali Hajimiri, John ...
CSEE
2011
Springer
12 years 11 months ago
Pex4Fun: Teaching and learning computer science via social gaming
Pex4Fun (http://www.pexforfun.com/)from Microsoft Research is a web-based serious gaming environment for teaching computer science. Pex4Fun can be used to teach and learn computer...
Nikolai Tillmann, Jonathan de Halleux, Tao Xie
TLDI
2005
ACM
135views Formal Methods» more  TLDI 2005»
14 years 29 days ago
Types for describing coordinated data structures
Coordinated data structures are sets of (perhaps unbounded) data structures where the nodes of each structure may share types with the corresponding nodes of the other structures....
Michael F. Ringenburg, Dan Grossman