Sciweavers

705 search results - page 61 / 141
» System Diagnosability Analysis Using p-slop MAP
Sort
View
SIGSOFT
2008
ACM
15 years 10 months ago
Marple: a demand-driven path-sensitive buffer overflow detector
Despite increasing efforts in detecting and managing software security vulnerabilities, the number of security attacks is still rising every year. As software becomes more complex...
Wei Le, Mary Lou Soffa
IWMM
2010
Springer
125views Hardware» more  IWMM 2010»
14 years 11 months ago
Efficient memory shadowing for 64-bit architectures
Shadow memory is used by dynamic program analysis tools to store metadata for tracking properties of application memory. The efficiency of mapping between application memory and s...
Qin Zhao, Derek Bruening, Saman P. Amarasinghe
RE
2010
Springer
14 years 8 months ago
Assessing traceability of software engineering artifacts
Abstract The generation of traceability links or traceability matrices is vital to many software engineering activities. It is also person-power intensive, time-consuming, error-pr...
Senthil Karthikeyan Sundaram, Jane Huffman Hayes, ...
CDC
2010
IEEE
134views Control Systems» more  CDC 2010»
14 years 4 months ago
Observer design for Lipschitz systems with discrete-time measurements
In this paper, the authors investigate the problem of designing an observer for Lipschitz nonlinear systems with discrete time measurements (continuous-discrete time systems). The ...
Vincent Andrieu, Madiha Nadri
FDL
2006
IEEE
15 years 3 months ago
Reusing Real-Time Systems Design Experience
To ensure correctness and performance of real-time embedded systems, early evaluation of properties is needed. Based on design experience for real-time systems and using the conce...
Oana Florescu, Jeroen Voeten, Marcel Verhoef, Henk...