Sciweavers

83 search results - page 3 / 17
» Software Deployment, Past, Present and Future
Sort
View
ICSE
2012
IEEE-ACM
11 years 8 months ago
A large scale exploratory analysis of software vulnerability life cycles
Abstract—Software systems inherently contain vulnerabilities that have been exploited in the past resulting in significant revenue losses. The study of vulnerability life cycles...
Muhammad Shahzad, Muhammad Zubair Shafiq, Alex X. ...
MICRO
2012
IEEE
231views Hardware» more  MICRO 2012»
11 years 8 months ago
What is Happening to Power, Performance, and Software?
The past 10 years have delivered two significant revolutions. (1) Microprocessor design has been transformed by the limits of chip power, wire latency, and Dennard scaling—leadi...
Hadi Esmaeilzadeh, Ting Cao, Xi Yang, Stephen Blac...
ATAL
2005
Springer
13 years 11 months ago
The DEFACTO system for human omnipresence to coordinate agent teams: the future of disaster response
Enabling interactions of agent-teams and humans is a critical area of research, with encouraging progress in the past few years. However, previous work suffers from three key lim...
Nathan Schurr, Janusz Marecki, N. Kasinadhuni, Mil...
ICSE
2009
IEEE-ACM
13 years 4 months ago
Reflecting on self-adaptive software systems
Self-adaptability has been proposed as an effective approach to automate the complexity associated with the management of modern-day software systems. While over the past decade w...
Jesper Andersson, Rogério de Lemos, Sam Mal...
EUROMICRO
2009
IEEE
13 years 10 months ago
Composition of Self Descriptive Protocols for Future Network Architectures
The network protocols we use today have been introduced decades ago. Since then the whole Internet came to existence and with it a single protocol stack: TCP/IP. What was a good s...
Dennis Schwerdel, Abbas Siddiqui, Bernd Reuther, P...