Sciweavers

23915 search results - page 4739 / 4783
» Management
Sort
View
INFSOF
2010
173views more  INFSOF 2010»
14 years 7 months ago
Filtering false alarms of buffer overflow analysis using SMT solvers
Buffer overflow detection using static analysis can provide a powerful tool for software ers to find difficult bugs in C programs. Sound static analysis based on abstract interpre...
Youil Kim, Jooyong Lee, Hwansoo Han, Kwang-Moo Cho...
INFSOF
2010
107views more  INFSOF 2010»
14 years 7 months ago
A systematic review on strategic release planning models
Context. Strategic release planning (sometimes referred to as road-mapping) is an important phase of the requirements engineering process performed at product level. It is concern...
Mikael Svahnberg, Tony Gorschek, Robert Feldt, Ric...
IPPS
2010
IEEE
14 years 7 months ago
Runtime checking of serializability in software transactional memory
Abstract--Ensuring the correctness of complex implementations of software transactional memory (STM) is a daunting task. Attempts have been made to formally verify STMs, but these ...
Arnab Sinha, Sharad Malik
ACSAC
2010
IEEE
14 years 6 months ago
Heap Taichi: exploiting memory allocation granularity in heap-spraying attacks
Heap spraying is an attack technique commonly used in hijacking browsers to download and execute malicious code. In this attack, attackers first fill a large portion of the victim...
Yu Ding, Tao Wei, Tielei Wang, Zhenkai Liang, Wei ...
CORR
2010
Springer
147views Education» more  CORR 2010»
14 years 6 months ago
RAFDA: A Policy-Aware Middleware Supporting the Flexible Separation of Application Logic from Distribution
Middleware technologies often limit the way in which object classes may be used in distributed applications due to the fixed distribution policies that they impose. These policies...
Scott M. Walker, Alan Dearle, Stuart J. Norcross, ...
« Prev « First page 4739 / 4783 Last » Next »