Sciweavers

1376 search results - page 24 / 276
» Monitoring Software Requirements Using Instrumented Code
Sort
View
ICPADS
2005
IEEE
15 years 3 months ago
Automated Discovery of Brand Piracy on the Internet
The Internet has become a key instrument for establishing and promoting product brands. Companies are very interested in detecting any misuse of their logos, plagiarism, grey impo...
Ulrich Pinsdorf, Peter Ebinger
CASCON
1997
97views Education» more  CASCON 1997»
14 years 11 months ago
Using shim technology to monitor DCE runtime performance
Obtaining performance data for application or system software is typically di cult, especially when the source code is not available. While popular techniques such as event trappi...
Gregory M. Oster, Richard B. Bunt
RE
2005
Springer
15 years 3 months ago
Identifying Contingency Requirements Using Obstacle Analysis
This paper describes the use of Obstacle Analysis to identify anomaly-handling requirements for a safetycritical, autonomous system. The software requirements for the system evolv...
Robyn R. Lutz, Stacy Nelson, Ann Patterson-Hine, C...
CGO
2006
IEEE
15 years 3 months ago
BIRD: Binary Interpretation using Runtime Disassembly
The majority of security vulnerabilities published in the literature are due to software bugs. Many researchers have developed program transformation and analysis techniques to au...
Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chi...
APSEC
2003
IEEE
15 years 3 months ago
Understanding How the Requirements Are Implemented in Source Code
For software maintenance and evolution, a common problem is to understand how each requirement is implemented in the source code. The basic solution of this problem is to find the...
Wei Zhao, Lu Zhang, Yin Liu, Jing Luo, Jiasu Sun