Sciweavers

1815 search results - page 113 / 363
» Making the Business Case for Software Performance Engineerin...
Sort
View
SIGSOFT
2010
ACM
14 years 9 months ago
Golden implementation driven software debugging
The presence of a functionally correct golden implementation has a significant advantage in the software development life cycle. Such a golden implementation is exploited for soft...
Ansuman Banerjee, Abhik Roychoudhury, Johannes A. ...
ICSE
2008
IEEE-ACM
15 years 12 months ago
Exploiting connector knowledge to efficiently disseminate highly voluminous data sets
Ever-growing amounts of data that must be distributed from data providers to consumers across the world necessitate a greater understanding of the software architectural implicati...
Chris Mattmann, David Woollard, Nenad Medvidovic
IWPC
2006
IEEE
15 years 6 months ago
Understanding Obfuscated Code
Code obfuscation makes it harder for a security analyst to understand the malicious payload of a program. In most cases an analyst needs to study the program at the machine code l...
Matias Madou, Ludo Van Put, Koen De Bosschere
KBSE
2007
IEEE
15 years 6 months ago
Effective memory protection using dynamic tainting
Programs written in languages that provide direct access to memory through pointers often contain memory-related faults, which may cause non-deterministic failures and even securi...
James A. Clause, Ioannis Doudalis, Alessandro Orso...
NLDB
2007
Springer
15 years 6 months ago
Treatment of Passive Voice and Conjunctions in Use Case Documents
Abstract. Requirements engineering, the first phase of any software development project, is the Achilles’ heel of the whole development process, as requirements documents are of...
Leonid Kof