Sciweavers

2030 search results - page 231 / 406
» Designing Complex Software Implementation Programs
Sort
View
CIIT
2004
132views Communications» more  CIIT 2004»
15 years 4 months ago
A vulnerability taxonomy for network protocols: Corresponding engineering best practice countermeasures
Vulnerabilities arising from in-secure network protocol design and implementation present significant challenges to the network protocol community. Yet much of the focus is on sof...
Venkat Pothamsetty, Bora A. Akyol
SEM
2004
Springer
15 years 8 months ago
Accuracy of Performance Prediction for EJB Applications: A Statistical Analysis
Abstract. A challenging software engineering problem is the design and implementation of component-based (CB) applications that can meet specified performance requirements. Our PPC...
Yan Liu, Ian Gorton
111
Voted
ICSE
1997
IEEE-ACM
15 years 7 months ago
Endeavors: A Process System Infrastructure
As software projects evolve, possibly differing in size, complexity, scope, and purpose, the development processes that support the project must evolve to reflect these changes. T...
Arthur S. Hitomi, Gregory Alan Bolcer, Richard N. ...
POPL
2012
ACM
13 years 10 months ago
Access permission contracts for scripting languages
The ideal software contract fully specifies the behavior of an operation. Often, in particular in the context of scripting languages, a full specification may be cumbersome to s...
Phillip Heidegger, Annette Bieniusa, Peter Thieman...
ISSTA
2006
ACM
15 years 8 months ago
The case for analysis preserving language transformation
Static analysis has gained much attention over the past few years in applications such as bug finding and program verification. As software becomes more complex and componentize...
Xiaolan Zhang, Larry Koved, Marco Pistoia, Sam Web...