Sciweavers

398 search results - page 20 / 80
» Using Benchmarking to Advance Research: A Challenge to Softw...
Sort
View
EUROSYS
2010
ACM
15 years 2 months ago
Residue objects: a challenge to web browser security
A complex software system typically has a large number of objects in the memory, holding references to each other to implement an object model. Deciding when the objects should be...
Shuo Chen, Hong Chen, Manuel Caballero
ICCSA
2010
Springer
14 years 7 months ago
An Aspect-Oriented Approach for Mobile Embedded Software Modeling
Recently, it is one of the most challenging fields in software engineering for embedded software development, since the advancement of embedded technologies has made our life incre...
Yong-Yi Fanjiang, Jong-Yih Kuo, Shang-Pin Ma, Wong...
ISSTA
2000
ACM
15 years 2 months ago
Which pointer analysis should I use?
During the past two decades many di erent pointer analysis algorithms have been published. Although some descriptions include measurements of the e ectiveness of the algorithm, qu...
Michael Hind, Anthony Pioli
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 2 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
WER
2004
Springer
15 years 3 months ago
Enhancing Requirements to derive Multi-Agent Architectures
Software systems of today are characterized by the increasing size, complexity, distribution and heterogeneity. Understanding and supporting the interaction between software requir...
Lúcia R. D. Bastos, Jaelson Brelaz de Castr...