Sciweavers

46 search results - page 4 / 10
» Where should the bugs be fixed
Sort
View
ASPLOS
2004
ACM
14 years 27 days ago
Low-overhead memory leak detection using adaptive statistical profiling
Sampling has been successfully used to identify performance optimization opportunities. We would like to apply similar techniques to check program correctness. Unfortunately, samp...
Matthias Hauswirth, Trishul M. Chilimbi
SIGCOMM
2000
ACM
13 years 11 months ago
When the CRC and TCP checksum disagree
Traces of Internet packets from the past two years show that between 1 packet in 1,100 and 1 packet in 32,000 fails the TCP checksum, even on links where link-level CRCs should ca...
Jonathan Stone, Craig Partridge
AOSD
2007
ACM
13 years 11 months ago
Debugging with control-flow breakpoints
Modern source-level debuggers support dynamic breakpoints that are guarded by conditions based on program state. Such breakpoints address situations where a static breakpoint is n...
Rick Chern, Kris De Volder
USS
2008
13 years 9 months ago
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking
Cross-site scripting (XSS) and SQL injection errors are two prominent examples of taint-based vulnerabilities that have been responsible for a large number of security breaches in...
Michael C. Martin, Monica S. Lam
ACMDIS
2000
ACM
13 years 11 months ago
Just-in-Time Design in a Fast-Paced Product Group
In real world development environments where deadlines are fixed, a designer must craft a process that works with the team and within the constraints of a project. The traditional...
Margo Lustig Ezekiel