Sciweavers

1026 search results - page 55 / 206
» Software Engineering for Self-Adaptive Systems: A Research R...
Sort
View
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 4 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
ECSA
2008
Springer
15 years 1 months ago
A Security Model for Internet-Based Digital Asset Management Systems
Abstract. Usage and exploitation of the Internet is a critical requirement for managing and distributing valuable digital assets. This requirement introduces a great number of thre...
Ioannis Chatzigiannakis, Vasiliki Liagkou, D. Salo...
ICSM
1999
IEEE
15 years 4 months ago
Assembler to C Migration Using the FermaT Transformation System
The FermaT transformation system, based on research carried out over the last twelve years at Durham University and Software Migrations Ltd., is an industrial-strength formal tran...
Martin P. Ward
ICSE
2003
IEEE-ACM
15 years 12 months ago
Beyond the Personal Software Process: Metrics collection and analysis for the differently disciplined
Pedagogies such as the Personal Software Process (PSP) shift metrics definition, collection, and analysis from the organizational level to the individual level. While case study r...
Philip M. Johnson, Hongbing Kou, Joy Agustin, Chri...
AMAST
2004
Springer
15 years 5 months ago
A Generic Software Safety Document Generator
Abstract. Formal certification is based on the idea that a mathematical proof of some property of a piece of software can be regarded as a certificate of correctness which, in pr...
Ewen Denney, Ram Prasad Venkatesan