Sciweavers

8347 search results - page 352 / 1670
» Performance testing of software systems
Sort
View
AINA
2007
IEEE
15 years 11 months ago
Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System
Malware and rootkits are serious security vulnerabilities, and they can be designed to be resistant to anti-viral software, or even totally undetectable. This paper described a hi...
Lifu Wang, Partha Dasgupta
SIGIR
2008
ACM
15 years 4 months ago
Blogger, stick to your story: modeling topical noise in blogs with coherence measures
Topical noise in blogs arises when bloggers digress from the central topical thrust of their blogs. We introduce a method to explicitly incorporate a model of topical noise into a...
Jiyin He, Wouter Weerkamp, Martha Larson, Maarten ...
ASPLOS
2009
ACM
16 years 5 months ago
Understanding software approaches for GPGPU reliability
Even though graphics processors (GPUs) are becoming increasingly popular for general purpose computing, current (and likely near future) generations of GPUs do not provide hardwar...
Martin Dimitrov, Mike Mantor, Huiyang Zhou
SIGSOFT
2009
ACM
16 years 5 months ago
Fair and balanced?: bias in bug-fix datasets
Software engineering researchers have long been interested in where and why bugs occur in code, and in predicting where they might turn up next. Historical bug-occurence data has ...
Christian Bird, Adrian Bachmann, Eirik Aune, John ...
151
Voted
ACMSE
2006
ACM
15 years 10 months ago
Static analysis of anomalies and security vulnerabilities in executable files
Software researchers have already developed static code security checkers to parse through and scan source code files, looking for security vulnerabilities [8, 9]. What about exec...
Jay-Evan J. Tevis, John A. Hamilton Jr.