Sciweavers

1548 search results - page 149 / 310
» Estimating Software Vulnerabilities
Sort
View
128
Voted
RTAS
2008
IEEE
15 years 6 months ago
Hybrid Timing Analysis of Modern Processor Pipelines via Hardware/Software Interactions
Embedded systems are often subject to constraints that require determinism to ensure that task deadlines are met. Such systems are referred to as real-time systems. Schedulability...
Sibin Mohan, Frank Mueller
ECRTS
2005
IEEE
15 years 5 months ago
Applying Static WCET Analysis to Automotive Communication Software
The number of embedded computers used in modern cars have increased dramatically during the last years, as they provide increased functionality to a reduced cost compared to previ...
Susanna Byhlin, Andreas Ermedahl, Jan Gustafsson, ...
PROFES
2004
Springer
15 years 5 months ago
Using a Reference Application with Design Patterns to Produce Industrial Software
Abstract. System architectures are described in abstract terms, often using Design Patterns. Actual reuse based on such descriptions requires that each development project derive a...
Marek Vokác, Oluf Jensen
BMCBI
2011
14 years 3 months ago
Software comparison for evaluating genomic copy number variation for Affymetrix 6.0 SNP array platform
Background: Copy number data are routinely being extracted from genome-wide association study chips using a variety of software. We empirically evaluated and compared four freely-...
Jeanette E. Eckel-Passow, Elizabeth J. Atkinson, S...
115
Voted
ISORC
1999
IEEE
15 years 4 months ago
Prediction of Fault-proneness at Early Phase in Object-Oriented Development
To analyze the complexity of object-oriented software, several metrics have been proposed. Among them, Chidamber and Kemerer's metrics are well-known ones as object-oriented ...
Toshihiro Kamiya, Shinji Kusumoto, Katsuro Inoue