Sciweavers

133 search results - page 11 / 27
» Analysis of Preventive Maintenance in Transactions Based Sof...
Sort
View
SIGSOFT
2007
ACM
15 years 10 months ago
Efficient token based clone detection with flexible tokenization
Code clones are similar code fragments that occur at multiple locations in a software system. Detection of code clones provides useful information for maintenance, reengineering, ...
Hamid Abdul Basit, Stan Jarzabek
ACSAC
2006
IEEE
15 years 3 months ago
V-COPS: A Vulnerability-Based Cooperative Alert Distribution System
The efficiency of promptly releasing security alerts of established analysis centers has been greatly challenged by the continuous emergence of various large scale network attack...
Shiping Chen, Dongyu Liu, Songqing Chen, Sushil Ja...
CODES
2003
IEEE
15 years 3 months ago
Security wrappers and power analysis for SoC technologies
Future wireless internet enabled devices will be increasingly powerful supporting many more applications including one of the most crucial, security. Although SoCs offer more resi...
Catherine H. Gebotys, Y. Zhang
TSMC
2008
119views more  TSMC 2008»
14 years 9 months ago
An Efficient Binary-Decision-Diagram-Based Approach for Network Reliability and Sensitivity Analysis
Abstract--Reliability and sensitivity analysis is a key component in the design, tuning, and maintenance of network systems. Tremendous research efforts have been expended in this ...
Liudong Xing
ICSM
1995
IEEE
15 years 1 months ago
Detecting interleaving
The various goals and requirements of a system are realized in software as fragments of code that are typically \interleaved" in that they may be woven together in the same c...
Spencer Rugaber, Kurt Stirewalt, Linda M. Wills