Sciweavers

283 search results - page 14 / 57
» Software Inspections We Can Trust
Sort
View
IAT
2005
IEEE
15 years 3 months ago
Multiagent Reputation Management to Achieve Robust Software Using Redundancy
This paper explains the building of robust software using multiagent reputation. One of the major goals of software engineering is to achieve robust software. Our hypothesis is th...
Rajesh Turlapati, Michael N. Huhns
ICSE
2000
IEEE-ACM
15 years 1 months ago
Software reliability and dependability: a roadmap
Software's increasing role creates both requirements for being able to trust it more than before, and for more people to know how much they can trust their software. A sound ...
Bev Littlewood, Lorenzo Strigini
CNSR
2006
IEEE
15 years 3 months ago
Trusted Computing for Protecting Ad-hoc Routing
Ad-hoc networks rely on participation and cooperation of nodes within the network to transmit data to destinations. However, in networks where participating nodes are controlled b...
Michael Jarrett, Paul Ward
SCAM
2005
IEEE
15 years 3 months ago
Static Analysis for Computing Escapability and Mutability for Java Components
A common theme in information security is protection of trusted software components against unauthorized access by untrusted users. In the context of distributed object technologi...
Aiwu Shi, Gleb Naumovich
AINA
2007
IEEE
15 years 3 months ago
Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System
Malware and rootkits are serious security vulnerabilities, and they can be designed to be resistant to anti-viral software, or even totally undetectable. This paper described a hi...
Lifu Wang, Partha Dasgupta