Sciweavers

269 search results - page 31 / 54
» Predicting risk of software changes
Sort
View
ACSAC
2000
IEEE
15 years 3 months ago
Security Agility in Response to Intrusion Detection
Cooperative frameworks for intrusion detection and response exemplify a key area of today’s computer research: automating defenses against malicious attacks that increasingly ar...
M. Petkac, Lee Badger
PVM
2004
Springer
15 years 3 months ago
A Performance-Oriented Technique for Hybrid Application Development
In SMP clusters it is not always convenient to switch from pure message-passing code to hybrid software designs that exploit shared memory. This paper tackles the problem of restru...
Emilio Mancini, Massimiliano Rak, Roberto Torella,...
71
Voted
ICSE
2003
IEEE-ACM
15 years 10 months ago
Whole Program Path-Based Dynamic Impact Analysis
Impact analysis, determining when a change in one part of a program affects other parts of the program, is timeconsuming and problematic. Impact analysis is rarely used to predict...
James Law, Gregg Rothermel
ESEM
2010
ACM
14 years 9 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
RV
2009
Springer
155views Hardware» more  RV 2009»
15 years 3 months ago
Hardware Supported Flexible Monitoring: Early Results
Monitoring of software’s execution is crucial in numerous software development tasks. Current monitoring efforts generally require extensive instrumentation of the software or d...
Antonia Zhai, Guojin He, Mats Per Erik Heimdahl