Sciweavers

1327 search results - page 119 / 266
» Cost-Benefit Analysis of Software Development Techniques and...
Sort
View
DSN
2008
IEEE
14 years 11 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
SIGSOFT
2003
ACM
15 years 10 months ago
Towards scalable compositional analysis by refactoring design models
Automated finite-state verification techniques have matured considerably in the past several years, but state-space explosion remains an obstacle to their use. Theoretical lower b...
Yung-Pin Cheng, Michal Young, Che-Ling Huang, Chia...
HICSS
2009
IEEE
104views Biometrics» more  HICSS 2009»
15 years 4 months ago
Multiple Social Networks Analysis of FLOSS Projects using Sargas
Due to their characteristics and claimed advantages, several researchers have been investigating free and open-source projects. Different aspects are being studied: for instance, ...
Samuel Felix de Sousa Jr., Marco Antonio Balieiro,...
MASCOTS
2008
14 years 11 months ago
Modeling Software Contention using Colored Petri Nets
Commercial servers, such as database or application servers, often attempt to improve performance via multithreading. Improper multi-threading architectures can incur contention, ...
Nilabja Roy, Akshay Dabholkar, Nathan Hamm, Lawren...
ECOOP
2007
Springer
15 years 4 months ago
Aspect-Based Introspection and Change Analysis for Evolving Programs
— As new versions of software are developed bugs inevitably arise either due to regression or new functionality. Challenges arise in discovering, managing, and testing the impact...
Kevin J. Hoffman, Murali Krishna Ramanathan, Patri...