Sciweavers

AOSD
2013
ACM
10 years 3 months ago
Reify your collection queries for modularity and speed!
Modularity and efficiency are often contradicting requirements, such that programers have to trade one for the other. We analyze this dilemma in the context of programs operating ...
Paolo G. Giarrusso, Klaus Ostermann, Michael Eichb...
SEFM
2014
IEEE
10 years 3 months ago
Towards Global and Local Types for Adaptation
Choreographies allow designers to specify the protocols followed by participants of a distributed interaction. Adapting the behavior of a participant, either because of external r...
Mario Bravetti, Marco Carbone, Thomas T. Hildebran...
ESSOS
2014
Springer
10 years 3 months ago
Detecting Code Reuse Attacks with a Model of Conformant Program Execution
Abstract. Code reuse attacks circumvent traditional program protection mechanisms such as W ⊕ X by constructing exploits from code already present within a process. Existing tech...
Emily R. Jacobson, Andrew R. Bernat, William R. Wi...

0
posts
with
0
views
406profile views
anildubeyProfessor, Assistant
Government Engineering College Ajmer
anildubey
Anil K. Dubey has received B.Tech degree from UPTU Lucknow, M.Tech from Govt. Engg College Ajmer and pursuing Ph.D. (CSE) from Carrier Point University Kota. Currently, he has work...
ICSE
2012
IEEE-ACM
11 years 10 months ago
A bidirectional model-driven spreadsheet environment
Abstract—In this extended abstract we present a bidirectional model-driven framework to develop spreadsheets. By being model driven, our approach allows to evolve a spreadsheet m...
Jácome Cunha, João Paulo Fernandes, ...
ICSE
2012
IEEE-ACM
11 years 10 months ago
Engineering and verifying requirements for programmable self-assembling nanomachines
—We propose an extension of van Lamsweerde’s goal-oriented requirements engineering to the domain of programmable DNA nanotechnology. This is a domain in which individual devic...
Robyn R. Lutz, Jack H. Lutz, James I. Lathrop, Tit...
ICSE
2012
IEEE-ACM
11 years 10 months ago
Industrial application of concolic testing approach: A case study on libexif by using CREST-BV and KLEE
—As smartphones become popular, manufacturers such as Samsung Electronics are developing smartphones with rich functionality such as a camera and photo editing quickly, which acc...
Yunho Kim, Moonzoo Kim, Young Joo Kim, Yoonkyu Jan...
ICSE
2012
IEEE-ACM
11 years 10 months ago
A large scale exploratory analysis of software vulnerability life cycles
Abstract—Software systems inherently contain vulnerabilities that have been exploited in the past resulting in significant revenue losses. The study of vulnerability life cycles...
Muhammad Shahzad, Muhammad Zubair Shafiq, Alex X. ...
ICSE
2012
IEEE-ACM
11 years 10 months ago
Axis: Automatically fixing atomicity violations through solving control constraints
Abstract—Atomicity, a general correctness criterion in concurrency programs, is often violated in real-world applications. The violations are difficult for developers to fix, m...
Peng Liu, Charles Zhang
ICSE
2012
IEEE-ACM
11 years 10 months ago
Where should the bugs be fixed? More accurate information retrieval-based bug localization based on bug reports
—For a large and evolving software system, the project team could receive a large number of bug reports. Locating the source code files that need to be changed in order to fix th...
Jian Zhou, Hongyu Zhang, David Lo