Sciweavers

624 search results - page 66 / 125
» Repositories with Public Data about Software Development
Sort
View
DSN
2008
IEEE
14 years 11 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
CIKM
2003
Springer
15 years 3 months ago
HyperThesis: the gRNA spell on the curse of bioinformatics applications integration
In this paper, we describe a graphical workflow management system called HyperThesis to address the challenges of integrating bioinformatics applications. HyperThesis is an integ...
Sourav S. Bhowmick, Vivek Vedagiri, Amey V. Laud
ICEIS
2009
IEEE
15 years 4 months ago
AgEx: A Financial Market Simulation Tool for Software Agents
Many researchers in the software agent field use the financial domain as a test bed to develop adaptation, cooperation and learning skills of software agents. However, there are no...
Paulo André Lima de Castro, Jaime Sim&atild...
CASCON
1996
120views Education» more  CASCON 1996»
14 years 11 months ago
Communication costs in code and design reviews: an empirical study
Software development managers strive to control all of the factors that might impact the success of their projects. However, not all of these factors have been identified, much le...
Carolyn B. Seaman
COMPSAC
2004
IEEE
15 years 1 months ago
Robustness Study of an Embedded Operating System for Industrial Applications
Critical industrial applications or fault tolerant applications need for operating systems (OS) which guarantee a correct and safe behaviour in spite of the appearance of errors. ...
Juan Pardo, José Carlos Campelo, Juan Jos&e...