Sciweavers

860 search results - page 80 / 172
» On How Developers Test Open Source Software Systems
Sort
View
CTRSA
2012
Springer
229views Cryptology» more  CTRSA 2012»
13 years 5 months ago
Practical Realisation and Elimination of an ECC-Related Software Bug Attack
We analyse and exploit implementation features in OpenSSL version 0.9.8g which permit an attack against ECDH-based functionality. The attack, although more general, can recover the...
Billy Bob Brumley, Manuel Barbosa, Dan Page, Frede...
KBSE
2008
IEEE
15 years 4 months ago
Testing Peers' Volatility
—Peer-to-peer (P2P) is becoming a key technology for software development, but still lacks integrated solutions to build trust in the final software, in terms of correctness and...
Eduardo Cunha de Almeida, Gerson Sunyé, Yve...
ISSRE
2007
IEEE
14 years 11 months ago
Data Mining Techniques for Building Fault-proneness Models in Telecom Java Software
This paper describes a study performed in an industrial setting that attempts to build predictive models to identify parts of a Java system with a high probability of fault. The s...
Erik Arisholm, Lionel C. Briand, Magnus Fuglerud
WCRE
2009
IEEE
15 years 4 months ago
Autumn Leaves: Curing the Window Plague in IDEs
—Navigating large software systems is difficult as the various artifacts are distributed in a huge space, while the relationships between different artifacts often remain hidden...
David Röthlisberger, Oscar Nierstrasz, St&eac...
HICSS
2009
IEEE
109views Biometrics» more  HICSS 2009»
15 years 4 months ago
The Construction of Peers and Artifacts: The Organizing Role of "Programming Guidelines"
In this paper, we1 study new organizational forms for production processes that emerge in large scale Free/Libre Open Source Software (FLOSS) projects. We will focus on the textua...
Vincenzo D'Andrea, Stefano De Paoli, Maurizio Teli