Sciweavers

7124 search results - page 1124 / 1425
» Programming Languages and Operating Systems
Sort
View
120
Voted
DSN
2000
IEEE
15 years 8 months ago
Testing for Software Vulnerability Using Environment Perturbation
We describe an methodology for testing a software system for possible security flaws. Based on the observation that most security flaws are caused by the program’s inappropria...
Wenliang Du, Aditya P. Mathur
ER
2009
Springer
130views Database» more  ER 2009»
15 years 10 months ago
Designing Law-Compliant Software Requirements
New laws, such as HIPAA and SOX, are increasingly impacting the design of software systems, as business organisations strive to comply. This paper studies the problem of generating...
Alberto Siena, John Mylopoulos, Anna Perini, Angel...
IFIP
2009
Springer
15 years 10 months ago
A Flexible Framework for Complete Session Mobility and Its Implementation
Users with several devices need a convenient mechanism to transfer running service sessions from one device to another device. This paper proposes a framework that allows session m...
Marc Barisch, Jochen Kögel, Sebastian Meier
ICSM
2008
IEEE
15 years 10 months ago
Non-invasive and non-scattered annotations for more robust pointcuts
Annotations are often mentioned as a potential alternative to tackle the fragile nature of AspectJ pointcuts. However, annotations themselves can be considered crosscutting elemen...
Leonardo Silva, Samuel Domingues, Marco Tulio de O...
FCCM
2007
IEEE
146views VLSI» more  FCCM 2007»
15 years 10 months ago
Mitrion-C Application Development on SGI Altix 350/RC100
This paper provides an evaluation of SGI® RASC™ RC100 technology from a computational science software developer’s perspective. A brute force implementation of a two-point an...
Volodymyr V. Kindratenko, Robert J. Brunner, Adam ...
« Prev « First page 1124 / 1425 Last » Next »