Sciweavers

5843 search results - page 974 / 1169
» Software Security in Practice
Sort
View
ISSTA
2010
ACM
15 years 7 months ago
Perturbing numerical calculations for statistical analysis of floating-point program (in)stability
Writing reliable software is difficult. It becomes even more difficult when writing scientific software involving floating-point numbers. Computers provide numbers with limite...
Enyi Tang, Earl T. Barr, Xuandong Li, Zhendong Su
EMSOFT
2008
Springer
15 years 6 months ago
Volatiles are miscompiled, and what to do about it
C's volatile qualifier is intended to provide a reliable link between operations at the source-code level and operations at the memorysystem level. We tested thirteen product...
Eric Eide, John Regehr
COMPUTER
1998
119views more  COMPUTER 1998»
15 years 4 months ago
Virtual Memory: Issues of Implementation
ion layer3,4 hides hardware particulars from the higher levels of software but can also compromise performance and compatibility; the higher levels of software often make unwitting...
Bruce L. Jacob, Trevor N. Mudge
147
Voted
SOFTWARE
2002
15 years 4 months ago
Failure or Success?
The body of literature on SMEs suggest that all SMEs seem to go through different life cycles, and while the terms used by different authors may vary, the events that govern them ...
151
Voted
ISSRE
2010
IEEE
15 years 3 months ago
Automating System Tests Using Declarative Virtual Machines
—Automated regression test suites are an essential software engineering practice: they provide developers with rapid feedback on the impact of changes to a system’s source code...
Sander van der Burg, Eelco Dolstra