Sciweavers

1327 search results - page 110 / 266
» Cost-Benefit Analysis of Software Development Techniques and...
Sort
View
IMA
2007
Springer
132views Cryptology» more  IMA 2007»
15 years 4 months ago
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
Onur Aciiçmez, Shay Gueron, Jean-Pierre Sei...
EUROSYS
2011
ACM
14 years 1 months ago
Striking a new balance between program instrumentation and debugging time
Although they are helpful in many cases, state-of-the-art bug reporting systems may impose excessive overhead on users, leak private information, or provide little help to the dev...
Olivier Crameri, Ricardo Bianchini, Willy Zwaenepo...
RE
1997
Springer
15 years 2 months ago
SOFL: A Formal Engineering Methodology for Industrial Applications
—Formal methods have yet to achieve wide industrial acceptance for several reasons. They are not well integrated into hed industrial software processes, their application require...
Shaoying Liu
METRICS
2002
IEEE
15 years 2 months ago
What We Have Learned About Fighting Defects
The Center for Empirically Based Software Engineering helps improve software development by providing guidelines for selecting development techniques, recommending areas for furth...
Forrest Shull, Victor R. Basili, Barry W. Boehm, A...
RE
2008
Springer
14 years 9 months ago
Rule-Based Maintenance of Post-Requirements Traceability Relations
An accurate set of traceability relations between software development artifacts is desirable to support evolutionary development. However, even where an initial set of traceabili...
Patrick Mäder, Orlena Gotel, Ilka Philippow