Sciweavers

8503 search results - page 1297 / 1701
» Secure Software Architectures
Sort
View
PLDI
2009
ACM
16 years 5 months ago
Automatic generation of library bindings using static analysis
High-level languages are growing in popularity. However, decades of C software development have produced large libraries of fast, timetested, meritorious code that are impractical...
Tristan Ravitch, Steve Jackson, Eric Aderhold, Ben...
ICSE
2004
IEEE-ACM
16 years 5 months ago
Concerning Predictability in Dependable Component-Based Systems: Classification of Quality Attributes
One of the main objectives of developing component-based software systems is to enable efficient building of systems through the integration of components. All component models def...
Ivica Crnkovic, Magnus Larsson, Otto Preiss
158
Voted
MOBISYS
2007
ACM
16 years 4 months ago
NodeMD: diagnosing node-level faults in remote wireless sensor systems
Software failures in wireless sensor systems are notoriously difficult to debug. Resource constraints in wireless deployments substantially restrict visibility into the root cause...
Veljko Krunic, Eric Trumpler, Richard Han
EUROSYS
2006
ACM
16 years 2 months ago
Solving the starting problem: device drivers as self-describing artifacts
Run-time conflicts can affect even the most rigorously tested software systems. A reliance on execution-based testing makes it prohibitively costly to test every possible interac...
Michael F. Spear, Tom Roeder, Orion Hodson, Galen ...
STEP
2005
IEEE
15 years 10 months ago
Using Metamodels in Service Interoperability
Interoperability in service oriented environments is heavily inuenced by the view that the cooperating services have on their data. e term service for the abstract contract concl...
Andreas Winter, Jürgen Ebert
« Prev « First page 1297 / 1701 Last » Next »