Sciweavers

2015 search results - page 205 / 403
» Hidden Software Capabilities
Sort
View
141
Voted
PDSE
2000
116views more  PDSE 2000»
15 years 4 months ago
A CORBA-Based Architecture for Adding Dependability to Legacy Servers
This work presents a flexible, CORBA compliant Middle-Tier Server architecture which is capable of adding dependability (namely, reliability, availability, and performability) to ...
Domenico Cotroneo, Luigi Romano, Stefano Russo, Ni...
CCS
2010
ACM
15 years 3 months ago
Input generation via decomposition and re-stitching: finding bugs in Malware
Attackers often take advantage of vulnerabilities in benign software, and the authors of benign software must search their code for bugs in hopes of finding vulnerabilities before...
Juan Caballero, Pongsin Poosankam, Stephen McCaman...
103
Voted
CLEIEJ
2006
96views more  CLEIEJ 2006»
15 years 3 months ago
A Single-Version Algorithmic Approach to Fault Tolerant Computing Using Static Redundancy
This paper describes a single-version algorithmic approach to design in fault tolerant computing in various computing systems by using static redundancy in order to mask transient...
Goutam Kumar Saha
JITECH
2008
86views more  JITECH 2008»
15 years 3 months ago
Generic verticalization strategies in enterprise system markets: An exploratory framework
In recent years, enterprise system (ES) software markets have been very dynamic. While contemporary customers are increasingly seeking ES solutions that require less and less cust...
Lior Fink, Sarit Markovich
134
Voted
CLEIEJ
2002
156views more  CLEIEJ 2002»
15 years 3 months ago
A Fuzzy Model for Function Point Analysis to Development and Enhancement Project Assessments
Function Point Analysis (FPA) is among the most commonly used techniques to estimate the size of software system projects or software systems. During the point counting process th...
Osias de Souza Lima Júnior, Pedro Porf&iacu...