Sciweavers

1548 search results - page 80 / 310
» Estimating Software Vulnerabilities
Sort
View
PRDC
1999
IEEE
15 years 3 months ago
An Architecture-Based Software Reliability Model
In this paper we present an analytical model for estimating architecture-based software reliability, according to the reliability of each component, the operational profile, and t...
Wen-Li Wang, Ye Wu, Mei-Hwa Chen
WCE
2007
15 years 11 days ago
Performing Early Feasibility Studies of Software Development Projects Using Business Process Models
—A new approach to perform feasibility studies using business process models is proposed. The utilization of the improved Role Activity Diagram notations has led to the extractio...
Ayman Issa, Faisal A. Abu Rub
HIPEAC
2010
Springer
15 years 8 months ago
Scalable Shared-Cache Management by Containing Thrashing Workloads
Abstract. Multi-core processors with shared last-level caches are vulnerable to performance inefficiencies and fairness issues when the cache is not carefully managed between the m...
Yuejian Xie, Gabriel H. Loh
CSSE
2008
IEEE
15 years 5 months ago
Embedding in Two Least Significant Bits with Wet Paper Coding
In this paper, we present three embedding schemes for extensions of least significant bit overwriting to both of the two lowest bit planes in digital images. Our approaches are in...
Xin Liao, Qiao-Yan Wen
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
15 years 5 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard