This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
We describe a technique for the control of production rules firing in an object-oriented setting. This technique is based on the separation of control rules from ordinary domain r...
development is a highly abstract process that requires intense concentration. The authors show that interrupting this process can significantly reduce a developer’s efficiency an...
—Architecture-based software reliability analysis methods shall help software architects to identify critical software components and to quantify their influence on the system r...
Software clones are considered harmful in software maintenance and evolution. However, despite a decade of active research, there is a marked lack of work in the detection and ana...