Sciweavers

1327 search results - page 108 / 266
» Cost-Benefit Analysis of Software Development Techniques and...
Sort
View
KBSE
2005
IEEE
15 years 3 months ago
AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks
The use of web applications has become increasingly popular in our routine activities, such as reading the news, paying bills, and shopping on-line. As the availability of these s...
William G. J. Halfond, Alessandro Orso
SAFECOMP
2007
Springer
15 years 4 months ago
Using Deductive Cause-Consequence Analysis (DCCA) with SCADE
Abstract. Esterel Technologies’ SCADE Suite is one of the most important development tools for software for safety-critical systems. It is used for designing many critical compon...
Matthias Güdemann, Frank Ortmeier, Wolfgang R...
ECLIPSE
2004
ACM
15 years 3 months ago
FeaturePlugin: feature modeling plug-in for Eclipse
Feature modeling is a key technique used in product-line development to model commonalities and variabilities of productline members. In this paper, we present FeaturePlugin, a fe...
Michal Antkiewicz, Krzysztof Czarnecki
ICST
2009
IEEE
14 years 7 months ago
Proving Functional Equivalence of Two AES Implementations Using Bounded Model Checking
Bounded model checking--as well as symbolic equivalence checking--are highly successful techniques in the hardware domain. Recently, bit-vector bounded model checkers like CBMC ha...
Hendrik Post, Carsten Sinz
HIPEAC
2010
Springer
15 years 7 months ago
Combining Locality Analysis with Online Proactive Job Co-scheduling in Chip Multiprocessors
Abstract. The shared-cache contention on Chip Multiprocessors causes performance degradation to applications and hurts system fairness. Many previously proposed solutions schedule ...
Yunlian Jiang, Kai Tian, Xipeng Shen