Sciweavers

1629 search results - page 229 / 326
» Infeasible Code Detection
Sort
View
116
Voted
ESEM
2007
ACM
15 years 3 months ago
Assessing, Comparing, and Combining Statechart- based testing and Structural testing: An Experiment
An important number of studies have addressed the importance of models in software engineering, mainly in the design of robust software systems. Although models have been proven t...
Samar Mouchawrab, Lionel C. Briand, Yvan Labiche
ICISC
2007
99views Cryptology» more  ICISC 2007»
15 years 2 months ago
Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module
VMM (virtual machine monitor) based system provides the useful inspection and interposition of guest OS. With proper modification of guest OS, we can obtain event-driven memory sn...
Ruo Ando, Youki Kadobayashi, Yoichi Shinoda
108
Voted
MASCOTS
2007
15 years 2 months ago
Improving the Performance of Passive Network Monitoring Applications using Locality Buffering
—In this paper, we present a novel approach for improving the performance of a large class of CPU and memory intensive passive network monitoring applications, such as intrusion ...
Antonis Papadogiannakis, Demetres Antoniades, Mich...
DAGSTUHL
2006
15 years 2 months ago
Program Compression
Abstract. The talk focused on a grammar-based technique for identifying redundancy in program code and taking advantage of that redundancy to reduce the memory required to store an...
William S. Evans
EUROPLOP
2006
15 years 2 months ago
Supporting the Selection of Design Patterns by Formal Definition and Considering Semantics
Extensibility and maintainability of software becomes more an issue as the complexity of the software development process rises. Design patterns in the sense of Gamma et al. [3] a...
Klaus Meffert