Sciweavers

1027 search results - page 100 / 206
» A Model for Java with Wildcards
Sort
View
122
Voted
ESEM
2008
ACM
15 years 5 months ago
An empirical model to predict security vulnerabilities using code complexity metrics
Complexity is often hypothesized to be the enemy of software security. If this hypothesis is true, complexity metrics may be used to predict the locale of security problems and ca...
Yonghee Shin, Laurie Williams
134
Voted
PST
2008
15 years 5 months ago
Model-Checking for Software Vulnerabilities Detection with Multi-Language Support
In this paper we develop a security verification framework for open source software with a multi-language support. We base our approach on the GCC compiler which is considered as ...
Rachid Hadjidj, Xiaochun Yang, Syrine Tlili, Moura...
134
Voted
IPPS
1999
IEEE
15 years 7 months ago
An Adaptive, Fault-Tolerant Implementation of BSP for JAVA-Based Volunteer Computing Systems
Abstract. In recent years, there has been a surge of interest in Javabased volunteer computing systems, which aim to make it possible to build very large parallel computing network...
Luis F. G. Sarmenta
WSC
2007
15 years 5 months ago
An object-oriented framework for simulating full truckload transportation networks
In this paper, we discuss the design and use of an objectoriented framework for simulating full truckload (FTL) networks. We present a context for how the framework can be used th...
Manuel D. Rossetti, Shikha Nangia
142
Voted
CORR
1998
Springer
100views Education» more  CORR 1998»
15 years 3 months ago
Push vs. Pull in Web-Based Network Management
In this paper, we build on the concept of embedded management application, proposed by Wellens and Auerbach, and present two models of network management application designs that ...
Jean-Philippe Martin-Flatin