Sciweavers

3316 search results - page 344 / 664
» Mining Software Engineering Data
Sort
View
117
Voted
COMPSAC
2008
IEEE
15 years 9 months ago
Mutation-Based Testing of Buffer Overflow Vulnerabilities
Buffer overflow (BOF) is one of the major vulnerabilities that leads to non-secure software. Testing an implementation for BOF vulnerabilities is challenging as the underlying rea...
Hossain Shahriar, Mohammad Zulkernine
ISSRE
2000
IEEE
15 years 7 months ago
Module Size Distribution and Defect Density
Data from several projects show a significant relationship between the size of a module and its defect density. Here we address implications of this observation. Does the overall ...
Yashwant K. Malaiya, Jason Denton
KORSO
1995
15 years 6 months ago
TROLL light - The Language and its Development Environment
in Data Types Specification, Proc. 10th Workshop on Specification of Abstract Data Types joint with the 5th COMPASS Workshop, S.Margherita, Italy, May/June 1994, Selected papers,...
Martin Gogolla, Stefan Conrad, Grit Denker, Rudolf...
ESEC
1991
Springer
15 years 6 months ago
A Dynamic Failure Model for Predicting the Impact that a Program Location has on the Program
This paper presents a dynamic technique for predicting the e ect that a location" of a program will have on the program's computational behavior. The technique is based ...
Jeffrey M. Voas
124
Voted
EUROSYS
2007
ACM
16 years 13 days ago
Sealing OS processes to improve dependability and safety
In most modern operating systems, a process is a -protected abstraction for isolating code and data. This protection, however, is selective. Many common mechanisms—dynamic code ...
Galen C. Hunt, Mark Aiken, Manuel Fähndrich, ...