Sciweavers

1548 search results - page 204 / 310
» Estimating Software Vulnerabilities
Sort
View
SEFM
2008
IEEE
15 years 5 months ago
A Fast Algorithm to Compute Heap Memory Bounds of Java Card Applets
We present an approach to find upper bounds of heap space for Java Card applets. Our method first transforms an input bytecode stream into a control flow graph (CFG), and then ...
Tuan-Hung Pham, Anh-Hoang Truong, Ninh-Thuan Truon...
SAMOS
2007
Springer
15 years 5 months ago
The Weight-Watcher Service and its Lightweight Implementation
—This paper presents the Weight-Watcher service. This service aims at providing resource consumption measurements and estimations for software executing on resourceconstrained de...
Benoît Garbinato, Rachid Guerraoui, Jarle Hu...
CSMR
2006
IEEE
15 years 5 months ago
A Metric of Confidence in Requirements Gathered from Legacy Systems: Two Industrial Case Studies
It is known that well over 50% of replacement projects fail. Requirements gathering go someway to contributing to this statistic; if the requirements we gather for the new system ...
James Marchant, Christos Tjortjis, Michael Turega
ADAEUROPE
2005
Springer
15 years 4 months ago
The ESA Ravenscar Benchmark
This article presents ERB, the ESA Ravenscar Benchmark. ERB aims at providing a synthetic benchmark comparing the efficiency of various Ada Ravenscar implementations and the RTEMS...
Romain Berrendonner, Jérôme Guitton
EDBTW
2004
Springer
15 years 4 months ago
Clustering XML Documents Using Structural Summaries
This work presents a methodology for grouping structurally similar XML documents using clustering algorithms. Modeling XML documents with tree-like structures, we face the ‘clust...
Theodore Dalamagas, Tao Cheng, Klaas-Jan Winkel, T...