Sciweavers

2826 search results - page 136 / 566
» A resource-based analysis of IT sourcing
Sort
View
ACSAC
2007
IEEE
15 years 8 months ago
Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting
We present an extension of traditional "black box" fuzz testing using a genetic algorithm based upon a Dynamic Markov Model fitness heuristic. This heuristic allows us t...
Sherri Sparks, Shawn Embleton, Ryan Cunningham, Cl...
104
Voted
CSMR
2005
IEEE
15 years 7 months ago
Correlating Features and Code Using a Compact Two-Sided Trace Analysis Approach
Software developers are constantly required to modify and adapt application features in response to changing requirements. The problem is that just by reading the source code, it ...
Orla Greevy, Stéphane Ducasse
ITCC
2005
IEEE
15 years 7 months ago
Using Formal Concept Analysis to Establish Model Dependencies
models evolve at different levels of abstraction, from the requirements specification to development of the source code. The models underlying this process are related and their ...
Igor Ivkovic, Kostas Kontogiannis
PRDC
2005
IEEE
15 years 7 months ago
On Automating Failure Mode Analysis and Enhancing its Integrity
This paper reports our experience on the development of a design-for-safety (DFS) workbench called Risk Assessment and Management Environment (RAME) for microelectronic avionics s...
Kam S. Tso, Ann T. Tai, Savio N. Chau, Leon Alkala...
ASIACRYPT
2005
Springer
15 years 7 months ago
An Analysis of the XSL Algorithm
The XSL “algorithm” is a method for solving systems of multivariate polynomial equations based on the linearization method. It was proposed in 2002 as a dedicated method for ex...
Carlos Cid, Gaëtan Leurent