Sciweavers

828 search results - page 51 / 166
» Software engineering research: from cradle to grave
Sort
View
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 6 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
HASE
2007
IEEE
15 years 8 months ago
Parsimonious Classifiers for Software Quality Assessment
—Modeling  to  predict fault­proneness of software modules is an important area  of research in software engineering. Most such models employ a large number ...
Miyoung Shin, Sunida Ratanothayanon, Amrit L. Goel...
SIGSOFT
2008
ACM
16 years 2 months ago
Javert: fully automatic mining of general temporal properties from dynamic traces
Program specifications are important for many tasks during software design, development, and maintenance. Among these, temporal specifications are particularly useful. They expres...
Mark Gabel, Zhendong Su
WER
2001
Springer
15 years 6 months ago
Automatic Derivation of Workflow Specifications from Organizational Structures and Use Cases
Workflow technology has reached a reasonable degree of maturity, with a number of both research prototypes and commercial systems available. However, methodological issues have rec...
María del Carmen Penadés, José...
SIGSOFT
2004
ACM
16 years 2 months ago
Testing static analysis tools using exploitable buffer overflows from open source code
Five modern static analysis tools (ARCHER, BOON, PolySpace C Verifier, Splint, and UNO) were evaluated using source code examples containing 14 exploitable buffer overflow vulnera...
Misha Zitser, Richard Lippmann, Tim Leek