Sciweavers

1376 search results - page 72 / 276
» Monitoring Software Requirements Using Instrumented Code
Sort
View
CISIS
2008
IEEE
14 years 11 months ago
Multi-variant Program Execution: Using Multi-core Systems to Defuse Buffer-Overflow Vulnerabilities
While memory-safe and type-safe languages have been available for many years, the vast majority of software is still implemented in type-unsafe languages such as C/C++. Despite ma...
Babak Salamat, Andreas Gal, Todd Jackson, Karthike...
SAC
2008
ACM
14 years 9 months ago
ECG data provisioning for telehomecare monitoring
The latest computer and communication technologies in combination with an enhanced ECG analysis system can be used to improve cardiac patient's follow-up out-of-hospital. In ...
Bernardo Gonçalves, José Gonç...
SOSP
2005
ACM
15 years 6 months ago
Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems
We propose a primitive, called Pioneer, as a first step towards verifiable code execution on untrusted legacy hosts. Pioneer does not require any hardware support such as secure...
Arvind Seshadri, Mark Luk, Elaine Shi, Adrian Perr...
ASE
2002
141views more  ASE 2002»
14 years 9 months ago
On the Automatic Recovery of Style-Specific Architectural Relations in Software Systems
The cost of maintaining a software system over a long period of time far exceeds its initial development cost. Much of the maintenance cost is attributed to the time required by ne...
Martin Traverso, Spiros Mancoridis
IPPS
2003
IEEE
15 years 3 months ago
MUSE: A Software Oscilloscope for Clusters and Grids
Oscilloscopes and their cousins, logic analyzers, are the tools of choice for difficult electronic hardware problems. In the hands of a skilled engineer or technician, these tool...
Mark K. Gardner, Michael Broxton, Adam Engelhart, ...