Sciweavers

398 search results - page 63 / 80
» Using Benchmarking to Advance Research: A Challenge to Softw...
Sort
View
DISCEX
2003
IEEE
15 years 3 months ago
Achieving Principled Assuredly Trustworthy Composable Systems and Networks
Huge challenges exist with systems and networks that must dependably satisfy stringent requirements for security, reliability, and other attributes of trustworthiness. Drawing on ...
Peter G. Neumann
AGILEDC
2003
IEEE
15 years 3 months ago
Introducing Agile Development into Bioinformatics: An Experience Report
This experience report describes our efforts to introduce agile development techniques incrementally into our customer’s organization in the National Cancer Institute and develo...
David Kane
PLDI
2009
ACM
15 years 4 months ago
TAJ: effective taint analysis of web applications
Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods and parameters may flow into security-sensitive operations. Taint analysis...
Omer Tripp, Marco Pistoia, Stephen J. Fink, Manu S...
QSIC
2005
IEEE
15 years 3 months ago
Fault-Based Testing of Database Application Programs with Conceptual Data Model
Database application programs typically contain program units that use SQL statements to manipulate records in database instances. Testing the correctness of data manipulation by ...
W. K. Chan, S. C. Cheung, T. H. Tse
PLDI
2009
ACM
15 years 10 months ago
Efficiently and precisely locating memory leaks and bloat
Inefficient use of memory, including leaks and bloat, remain a significant challenge for C and C++ developers. Applications with these problems become slower over time as their wo...
Gene Novark, Emery D. Berger, Benjamin G. Zorn