Sciweavers

1702 search results - page 98 / 341
» Doomed program points
Sort
View
CORR
2011
Springer
197views Education» more  CORR 2011»
14 years 8 months ago
Securing The Kernel via Static Binary Rewriting and Program Shepherding
Recent Microsoft security bulletins show that kernel vulnerabilities are becoming more and more important security threats. Despite the pretty extensive security mitigations many ...
Piotr Bania
ICSM
2006
IEEE
15 years 11 months ago
Dynamic Updating of Software Systems Based on Aspects
Long-running applications such as network services require continuous uptime but also frequent changes to the software. To avoid downtime for software maintenance, applications mu...
Susanne Cech Previtali, Thomas R. Gross
ATS
2003
IEEE
112views Hardware» more  ATS 2003»
15 years 10 months ago
Domain Testing Based on Character String Predicate
Domain testing is a well-known software testing technique. Although research tasks have been initiated in domain testing, automatic test data generation based on character string ...
Ruilian Zhao, Michael R. Lyu, Yinghua Min
ECOOP
2005
Springer
15 years 10 months ago
A Biologist's View of Software Evolution
Abstract. The term “software evolution” is generally used as an analogy for biological evolution. This paper explores that analogy in more depth, analyzing software evolution f...
DeLesley Hutchins
156
Voted
ESOP
2005
Springer
15 years 10 months ago
Forward Slicing by Conjunctive Partial Deduction and Argument Filtering
Program slicing is a well-known methodology that aims at identifying the program statements that (potentially) affect the values computed at some point of interest. Within imperat...
Michael Leuschel, Germán Vidal