Sciweavers

1376 search results - page 59 / 276
» Monitoring Software Requirements Using Instrumented Code
Sort
View
CCS
2003
ACM
15 years 9 months ago
Monitoring and early warning for internet worms
After the Code Red incident in 2001 and the SQL Slammer in January 2003, it is clear that a simple self-propagating worm can quickly spread across the Internet, infects most vulne...
Cliff Changchun Zou, Lixin Gao, Weibo Gong, Donald...
ICSR
2009
Springer
15 years 2 months ago
Verifying Component-Based Software: Deep Mathematics or Simple Bookkeeping?
Anecdotal experience constructing proofs of correctness of code built from reusable software components reveals that they tend to be relatively trivial bookkeeping exercises: they ...
Jason Kirschenbaum, Bruce M. Adcock, Derek Bronish...
APSEC
2005
IEEE
15 years 10 months ago
An Integrated Solution for Testing and Analyzing Java Applications in an Industrial Setting
Testing a large-scale, real-life commercial software application is a very challenging task due to the constant changes in the software, the involvement of multiple programmers an...
W. Eric Wong, J. Jenny Li
WCRE
2009
IEEE
15 years 11 months ago
Automatic Static Unpacking of Malware Binaries
—Current malware is often transmitted in packed or encrypted form to prevent examination by anti-virus software. To analyze new malware, researchers typically resort to dynamic c...
Kevin Coogan, Saumya K. Debray, Tasneem Kaochar, G...
ECLIPSE
2007
ACM
15 years 8 months ago
Building, deploying, and monitoring distributed applications with Eclipse and R-OSGI
Designing and testing distributed applications is still a difficult task that requires in-depth knowledge about networking issues. Eclipse is, among other things, a powerful and w...
Jan S. Rellermeyer, Gustavo Alonso, Timothy Roscoe