Sciweavers

794 search results - page 105 / 159
» Automatically Analyzing Software Processes: Experience Repor...
Sort
View
85
Voted
KBSE
2007
IEEE
15 years 6 months ago
Adaptation hiding modularity
Growth in the complexity of computing systems, in the dynamism of the environments they operate in, and the need for timely adaptations as conditions change, now pose significant...
Yuanyuan Song
132
Voted
SEKE
2010
Springer
14 years 11 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
103
Voted
MSR
2006
ACM
15 years 6 months ago
Tracking defect warnings across versions
Various static analysis tools will analyze a software artifact in order to identify potential defects, such as misused APIs, race conditions and deadlocks, and security vulnerabil...
Jaime Spacco, David Hovemeyer, William Pugh
101
Voted
EUROPAR
2008
Springer
15 years 2 months ago
Radioastronomy Image Synthesis on the Cell/B.E.
Abstract. Now that large radiotelescopes like SKA, LOFAR, or ASKAP, become available in different parts of the world, radioastronomers foresee a vast increase in the amount of data...
Ana Lucia Varbanescu, Alexander S. van Amesfoort, ...
89
Voted
ISESE
2002
IEEE
15 years 5 months ago
Verification and Validation in Industry -- A Qualitative Survey on the State of Practice
Verification and validation activities take a substantial share of project budgets and need improvements. This is an accepted truth, but the current practices are seldom assessed ...
Carina Andersson, Per Runeson