Sciweavers

21 search results - page 2 / 5
» Precisely Detecting Runtime Change Interactions for Evolving...
Sort
View
ACSAC
2005
IEEE
13 years 10 months ago
Stealth Breakpoints
Microscopic analysis of malicious code (malware) requires the aid of a variety of powerful tools. Chief among them is a debugger that enables runtime binary analysis at an instruc...
Amit Vasudevan, Ramesh Yerraballi
CCS
2009
ACM
13 years 11 months ago
Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes
Large-scale distributed systems have dense, complex code-bases that are assumed to perform multiple and inter-dependent tasks while user interaction is present. The way users inte...
Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Mich...
SIGSOFT
2007
ACM
14 years 5 months ago
Detection and resolution of atomicity violation in service composition
Atomicity is a desirable property that safeguards application consistency for service compositions. A service composition exhibiting this property could either complete or cancel ...
Chunyang Ye, S. C. Cheung, W. K. Chan, Chang Xu
ISPW
2007
IEEE
13 years 11 months ago
An Algebraic Approach for Managing Inconsistencies in Software Processes,
To produce quality software and evolve them in an economic and timely fashion, enactable software process models are used for regulating development activities with the support of ...
Qiusong Yang, Mingshu Li, Qing Wang, Guowei Yang, ...
CSMR
2005
IEEE
13 years 10 months ago
Tracing Cross-Cutting Requirements via Context-Based Constraints
In complex systems, it is difficult to identify which system element is involved in which requirement. In this article, we present a new approach for expressing and validating a ...
Felix Bübl, Michael Balser