Sciweavers

1548 search results - page 179 / 310
» Estimating Software Vulnerabilities
Sort
View
SIGCOMM
2012
ACM
13 years 1 months ago
Abstractions for network update
ions for Network Update Mark Reitblatt Cornell Nate Foster Cornell Jennifer Rexford Princeton Cole Schlesinger Princeton David Walker Princeton Configuration changes are a common...
Mark Reitblatt, Nate Foster, Jennifer Rexford, Col...
ISCA
2012
IEEE
212views Hardware» more  ISCA 2012»
13 years 1 months ago
TimeWarp: Rethinking timekeeping and performance monitoring mechanisms to mitigate side-channel attacks
Over the past two decades, several microarchitectural side channels have been exploited to create sophisticated security attacks. Solutions to this problem have mainly focused on ...
Robert Martin, John Demme, Simha Sethumadhavan
91
Voted
METRICS
1998
IEEE
15 years 3 months ago
Getting a Handle on the Fault Injection Process: Validation of Measurement Tools
In any manufacturing environment, the fault injection rate might be considered one of the most meaningful criterion to evaluate the goodness of the development process. In our fie...
Sebastian G. Elbaum, John C. Munson
IWPC
1998
IEEE
15 years 3 months ago
Rapid System Understanding: Two COBOL Case Studies
Rapid system understanding is required in the planning, feasibility assessment and cost estimating phases of a system renovation project. In this paper, we apply a number of analy...
Arie van Deursen, Tobias Kuipers
KBSE
2002
IEEE
15 years 4 months ago
Model-Based Tests of Truisms
Software engineering (SE) truisms capture broadlyapplicable principles of software construction. The trouble with truisms is that such general principles may not apply in specifi...
Tim Menzies, David Raffo, Siri-on Setamanit, Ying ...