Sciweavers

613 search results - page 61 / 123
» An analysis framework for network-code programs
Sort
View
SQJ
2002
90views more  SQJ 2002»
14 years 9 months ago
Critical Analysis of the PIE Testability Technique
Abstract. The work of Voas and colleagues has introduced, refined and applied the propagation, infection and execution (PIE) analysis technique for measuring testability of program...
Zuhoor A. Al-Khanjari, Martin R. Woodward, Haider ...
CORR
2010
Springer
135views Education» more  CORR 2010»
14 years 9 months ago
Automatic derivation of domain terms and concept location based on the analysis of the identifiers
Abstract. Developers express the meaning of the domain ideas in specifically selected identifiers and comments that form the target implemented code. Software maintenance requires ...
Peter Václavík, Jaroslav Porubä...
WCRE
2002
IEEE
15 years 2 months ago
Analysis of Virtual Method Invocation for Binary Translation
The University of Queensland Binary Translator (UQBT ) is a static binary translation framework that allows for the translation of binary, executable programs, from one architectu...
Jens Tröger, Cristina Cifuentes
IFIP
2007
Springer
15 years 3 months ago
Insider Threat Analysis Using Information-Centric Modeling
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling sys...
Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo, S. P...
ICSM
1997
IEEE
15 years 1 months ago
Identifying modules via concept analysis
ÐWe describe a general technique for identifying modules in legacy code. The method is based on concept analysisÐa branch of lattice theory that can be used to identify similarit...
Michael Siff, Thomas W. Reps