-
1
-
-
0036036580
-
Accelerating software development through collaboration
-
Orlando, Florida
-
Augustin, L., Dressler, D., Smith, G. "Accelerating Software Development through Collaboration." In Proc. 24th International Conf. Software Engineering, p.559-563, Orlando, Florida, 2002.
-
(2002)
Proc. 24th International Conf. Software Engineering
, pp. 559-563
-
-
Augustin, L.1
Dressler, D.2
Smith, G.3
-
2
-
-
1442339050
-
From symptom to cause: Localizing errors in counterexample traces
-
New Orleans, Louisiana
-
Ball, T., Naik, M., Rajamani, S. "From Symptom to Cause: Localizing Errors in Counterexample Traces." In Proc. 30th ACM SIGPLAN-SIGACT Symp. on Principles of Programming Languages, p.97-105, New Orleans, Louisiana, 2003.
-
(2003)
Proc. 30th ACM SIGPLAN-SIGACT Symp. on Principles of Programming Languages
, pp. 97-105
-
-
Ball, T.1
Naik, M.2
Rajamani, S.3
-
3
-
-
84944319371
-
Symbolic model checking without BDDs
-
Amsterdam, The Netherlands, Springer-Verlag
-
Biere, A., Cimatti, A., Clarke, E. M., Fujita, M., Zhu, Y. "Symbolic Model Checking without BDDs." In Proc. 5th Int'l Conf. Tools and Algorithms for Construction and Analysis of Systems, p. 193-207, volume LNCS 1579, Amsterdam, The Netherlands, 1999. Springer-Verlag.
-
(1999)
Proc. 5th Int'l Conf. Tools and Algorithms for Construction and Analysis of Systems
, vol.LNCS 1579
, pp. 193-207
-
-
Biere, A.1
Cimatti, A.2
Clarke, E.M.3
Fujita, M.4
Zhu, Y.5
-
4
-
-
0032630134
-
Symbolic model checking using SAT procedures instead of BDDs
-
New Orleans, Las Angeles
-
Biere, A., Cimatti, A., Clarke, E. M., Fujita, M., Zhu, Y. "Symbolic Model Checking using SAT Procedures instead of BDDs." In Proc. 36th Design Automation Conference, p.317-320, New Orleans, Las Angeles, 1999.
-
(1999)
Proc. 36th Design Automation Conference
, pp. 317-320
-
-
Biere, A.1
Cimatti, A.2
Clarke, E.M.3
Fujita, M.4
Zhu, Y.5
-
5
-
-
0000301097
-
A greedy heuristic for the set covering problem
-
Chvatal, V. "A Greedy Heuristic for the Set Covering Problem." Mathematics of Operations Research, 4:33-235, 1979.
-
(1979)
Mathematics of Operations Research
, vol.4
, pp. 33-235
-
-
Chvatal, V.1
-
6
-
-
0043197065
-
Behavioral consistency of C and verilog programs using bounded model checking
-
Carnegie Mellon University, School of Computer Science
-
Clarke, E., Kroening, D., Yorav, k. "Behavioral Consistency of C and Verilog Programs using Bounded Model Checking." Technical Report CMU-CS-03-126, Carnegie Mellon University, School of Computer Science, 2003.
-
(2003)
Technical Report
, vol.CMU-CS-03-126
-
-
Clarke, E.1
Kroening, D.2
Yorav, K.3
-
7
-
-
0042134845
-
Behavioral consistency of C and verilog programs using bounded model checking
-
Session 23.3, Anaheim, CA
-
Clarke, E., Kroening, D., Yorav, K. "Behavioral Consistency of C and Verilog Programs using Bounded Model Checking." In Proc. 40th Design Automation Conference, Session 23.3, Anaheim, CA, 2003.
-
(2003)
Proc. 40th Design Automation Conference
-
-
Clarke, E.1
Kroening, D.2
Yorav, K.3
-
9
-
-
85050550846
-
Abstract interpretation: A unified lattice model for static analysis of programs by constructions or approximation of fixpoints
-
Cousot, P., Cousot, R. "Abstract Interpretation: A Unified Lattice Model for Static Analysis of Programs by Constructions or Approximation of Fixpoints." In Conference Record of the 4th ACM Symp. Principles of Programming Languages, p.238-252, 1977.
-
(1977)
Conference Record of the 4th ACM Symp. Principles of Programming Languages
, pp. 238-252
-
-
Cousot, P.1
Cousot, R.2
-
10
-
-
4544220587
-
-
The Open Web Application Security Project, v.1.1.1, Sep
-
Curphey, M., Endler, D., Hau, W., Taylor, S., Smith, T., Russell, A., McKenna, G., Parke, R., McLaughlin, K., Tranter, N., Klien, A., Groves, D., By-Gad, I., Huseby, S., Eizner, M., McNamara, R. "A Guide to Building Secure Web Applications." The Open Web Application Security Project, v.1.1.1, Sep 2002.
-
(2002)
A Guide to Building Secure Web Applications
-
-
Curphey, M.1
Endler, D.2
Hau, W.3
Taylor, S.4
Smith, T.5
Russell, A.6
McKenna, G.7
Parke, R.8
McLaughlin, K.9
Tranter, N.10
Klien, A.11
Groves, D.12
By-Gad, I.13
Huseby, S.14
Eizner, M.15
McNamara, R.16
-
11
-
-
0024866680
-
An efficient method of computing static single assignment form
-
Austin, Texas, ACM Press
-
Cytron, R., Ferrante, J., Rosen, B. K., Wegman, M. N., Zadeck, F. K. "An Efficient Method of Computing Static Single Assignment Form." In Proc. 16th ACM SIGPLAN-SIGACT Symp. Principles of Programming Languages, p.25-35, Austin, Texas, 1989. ACM Press.
-
(1989)
Proc. 16th ACM SIGPLAN-SIGACT Symp. Principles of Programming Languages
, pp. 25-35
-
-
Cytron, R.1
Ferrante, J.2
Rosen, B.K.3
Wegman, M.N.4
Zadeck, F.K.5
-
12
-
-
0016949746
-
A lattice model of secure information flow
-
Denning, D. E. "A Lattice Model of Secure Information Flow." Communications of the ACM, 19(5):236-243, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
13
-
-
84880450431
-
Web application security assessment by fault injection and behavior monitoring
-
Budapest, Hungary
-
Huang, Y. W., Huang, S. K., Lin, T. P., Tsai, C. H. "Web Application Security Assessment by Fault Injection and Behavior Monitoring." In Proc. 12th Int'l World Wide Web Conference, p.148-159, Budapest, Hungary, 2003.
-
(2003)
Proc. 12th Int'l World Wide Web Conference
, pp. 148-159
-
-
Huang, Y.W.1
Huang, S.K.2
Lin, T.P.3
Tsai, C.H.4
-
14
-
-
19944365247
-
Securing web application code by static analysis and runtime inspection
-
New York
-
Huang, Y. W., Yu, F., Hang, C., Tsai, C. H., Lee, D.T., Kuo, S. Y. "Securing Web Application Code by Static Analysis and Runtime Inspection." In: Proc. 13th Int'l World Wide Web Conference, New York, 2004.
-
(2004)
Proc. 13th Int'l World Wide Web Conference
-
-
Huang, Y.W.1
Yu, F.2
Hang, C.3
Tsai, C.H.4
Lee, D.T.5
Kuo, S.Y.6
-
16
-
-
35248888895
-
Efficient computation of recurrence diameters
-
New York, Springer-Verlag
-
Kroening, D., Strichman, O. "Efficient Computation of Recurrence Diameters." In Proc. 4th Int'l Conf. Verification, Model Checking, and Abstract Interpretation, p.298-309, volume LNCS 2575, New York, 2003. Springer-Verlag.
-
(2003)
Proc. 4th Int'l Conf. Verification, Model Checking, and Abstract Interpretation
, vol.LNCS 2575
, pp. 298-309
-
-
Kroening, D.1
Strichman, O.2
-
17
-
-
4544364572
-
-
Microsoft Corporation
-
Meier, J.D., Mackman, A., Vasireddy, S. Dunner, M., Escamilla, R., Murukan, A. "Improving Web Application Security - Threats and Countermeasures." Microsoft Corporation, 2003.
-
(2003)
Improving Web Application Security - Threats and Countermeasures
-
-
Meier, J.D.1
Mackman, A.2
Vasireddy, S.3
Dunner, M.4
Escamilla, R.5
Murukan, A.6
-
18
-
-
0036922119
-
Measuring end-user availability on the web: Practical experience
-
Washington, D.C
-
Merzbacher, M., Patterson, D. "Measuring End-User Availability on the Web: Practical Experience." In Proc. 2002 Int'l Conf. Dependable Systems and Networks, p.473-488, Washington, D.C., 2002.
-
(2002)
Proc. 2002 Int'l Conf. Dependable Systems and Networks
, pp. 473-488
-
-
Merzbacher, M.1
Patterson, D.2
-
19
-
-
0034852165
-
Chaff: Engineering an efficient SAT solver
-
session 33.1, New Orleans, LA
-
Moskewicz, M. W., Madigan, C. F., Zhao, Y., Zhang, L., Malik, S. "Chaff: Engineering an Efficient SAT Solver." In Proc. 38th Design Automation Conference, session 33.1, New Orleans, LA, 2001.
-
(2001)
Proc. 38th Design Automation Conference
-
-
Moskewicz, M.W.1
Madigan, C.F.2
Zhao, Y.3
Zhang, L.4
Malik, S.5
-
20
-
-
4544371144
-
The ten most critical web application security vulnerabilities
-
OWASP. "The Ten Most Critical Web Application Security Vulnerabilities." OWASP Whitepaper, version 1.0, 2003.
-
(2003)
OWASP Whitepaper, Version 1.0
-
-
-
21
-
-
0348017041
-
Information flow inference for ML
-
Pottier, F., Simonet, V. "Information Flow Inference for ML." ACM Transactions on Programming Languages and Systems, 25(1):117-158, 2003.
-
(2003)
ACM Transactions on Programming Languages and Systems
, vol.25
, Issue.1
, pp. 117-158
-
-
Pottier, F.1
Simonet, V.2
-
22
-
-
0027699087
-
Lattice-based access control models
-
Sandhu, R. S. "Lattice-Based Access Control Models." IEEE Computer, 26(11):9-19, 1993.
-
(1993)
IEEE Computer
, vol.26
, Issue.11
, pp. 9-19
-
-
Sandhu, R.S.1
-
23
-
-
21244432992
-
Unbounded, fully symbolic model checking of timed automata using boolean methods
-
Boulder, Colorado, Springer-Verlag
-
Sanjit, A. S., Bryant, R. E., "Unbounded, Fully Symbolic Model Checking of Timed Automata using Boolean Methods." In Proc. 15th Int'l Conf. Computer-Aided Verification, p.154-166, volume LNCS 2725, Boulder, Colorado, 2003. Springer-Verlag.
-
(2003)
Proc. 15th Int'l Conf. Computer-Aided Verification
, vol.LNCS 2725
, pp. 154-166
-
-
Sanjit, A.S.1
Bryant, R.E.2
-
24
-
-
77953069969
-
Abstracting application-level web security
-
Honolulu, Hawaii
-
Scott, D., Sharp, R. "Abstracting Application-Level Web Security." In Proc. 11th Int'l World Wide Web Conference, p.396-407, Honolulu, Hawaii, 2002.
-
(2002)
Proc. 11th Int'l World Wide Web Conference
, pp. 396-407
-
-
Scott, D.1
Sharp, R.2
-
25
-
-
0242357321
-
Detecting format string vulnerabilities with type qualifiers
-
Washington DC
-
Shankar, U., Talwar, K., Foster, J. S., Wagner, D. "Detecting Format String Vulnerabilities with Type Qualifiers." In Proc. 10th USENIX Security Symposium, p.201-220, Washington DC, 2002.
-
(2002)
Proc. 10th USENIX Security Symposium
, pp. 201-220
-
-
Shankar, U.1
Talwar, K.2
Foster, J.S.3
Wagner, D.4
-
26
-
-
0022605097
-
Typestate: A programming language concept for enhancing software reliability
-
Jan
-
Strom, R. E., Yemini, S. A. "Typestate: A Programming Language Concept for Enhancing Software Reliability." IEEE Transactions on Software Engineering, 12(1):157-171, Jan 1986.
-
(1986)
IEEE Transactions on Software Engineering
, vol.12
, Issue.1
, pp. 157-171
-
-
Strom, R.E.1
Yemini, S.A.2
-
28
-
-
4544292312
-
Portal replication for web application availability via SOAP
-
Guadalajara, Mexico
-
Woodman, S., Morgan, G., Parkin, S. "Portal Replication for Web Application Availability Via SOAP." In Proc. 8th IEEE Int'l Workshop on Object-Oriented Real-Time Dependable Systems, p. 122-130, Guadalajara, Mexico, 2003.
-
(2003)
Proc. 8th IEEE Int'l Workshop on Object-oriented Real-time Dependable Systems
, pp. 122-130
-
-
Woodman, S.1
Morgan, G.2
Parkin, S.3
-
29
-
-
0030777956
-
A practical soft type system for scheme
-
Jan
-
Wright, A. K, Cartwright, R. "A Practical Soft Type System for Scheme." ACM Transactions on Programming Languages and Systems, 19(1):87-152, Jan 1999.
-
(1999)
ACM Transactions on Programming Languages and Systems
, vol.19
, Issue.1
, pp. 87-152
-
-
Wright, A.K.1
Cartwright, R.2
|