Sciweavers

1376 search results - page 96 / 276
» Monitoring Software Requirements Using Instrumented Code
Sort
View
APSEC
2001
IEEE
15 years 1 months ago
Compilation of Specifications
Computer software now controls critical systems worldwide. International standards require such programs to be produced from mathematically-precise specifications, but the techniq...
Colin J. Fidge
CC
2004
Springer
134views System Software» more  CC 2004»
15 years 1 months ago
Widening Integer Arithmetic
Abstract. Some codes require computations to use fewer bits of precision than are normal for the target machine. For example, Java requires 32-bit arithmetic even on a 64-bit targe...
Kevin Redwine, Norman Ramsey
SIGSOFT
2007
ACM
15 years 10 months ago
Training on errors experiment to detect fault-prone software modules by spam filter
The fault-prone module detection in source code is of importance for assurance of software quality. Most of previous fault-prone detection approaches are based on software metrics...
Osamu Mizuno, Tohru Kikuno
ACSAC
2006
IEEE
15 years 4 months ago
Known/Chosen Key Attacks against Software Instruction Set Randomization
Instruction Set Randomization (ISR) has been proposed as a form of defense against binary code injection into an executing program. One proof-of-concept implementation is Randomiz...
Yoav Weiss, Elena Gabriela Barrantes
BMCBI
2007
195views more  BMCBI 2007»
14 years 10 months ago
NeuroTerrain - a client-server system for browsing 3D biomedical image data sets
Background: Three dimensional biomedical image sets are becoming ubiquitous, along with the canonical atlases providing the necessary spatial context for analysis. To make full us...
Carl Gustafson, William J. Bug, Jonathan Nissanov