Sciweavers

685 search results - page 84 / 137
» A Comparative Study of Three Program Exploration Tools
Sort
View
FMICS
2008
Springer
13 years 9 months ago
Dynamic Event-Based Runtime Monitoring of Real-Time and Contextual Properties
Given the intractability of exhaustively verifying software, the use of runtime-verification, to verify single execution paths at runtime, is becoming popular. Although the use of ...
Christian Colombo, Gordon J. Pace, Gerardo Schneid...
ASPLOS
2004
ACM
14 years 1 months ago
Deconstructing storage arrays
We introduce Shear, a user-level software tool that characterizes RAID storage arrays. Shear employs a set of controlled algorithms combined with statistical techniques to automat...
Timothy E. Denehy, John Bent, Florentina I. Popovi...
ICSE
2000
IEEE-ACM
13 years 11 months ago
Multiple mass-market applications as components
Truly successful models for component-based software development continue to prove elusive. One of the few is the use of operating system, database and similar programs in many sy...
David Coppit, Kevin J. Sullivan
ISW
2009
Springer
14 years 2 months ago
Automated Spyware Collection and Analysis
Various online studies on the prevalence of spyware attest overwhelming numbers (up to 80%) of infected home computers. However, the term spyware is ambiguous and can refer to anyt...
Andreas Stamminger, Christopher Kruegel, Giovanni ...
AOSD
2006
ACM
14 years 2 months ago
Presenting crosscutting structure with active models
When modifying or debugging a software system, among other tasks, developers must often understand and manipulate source code that crosscuts the system’s structure. These tasks ...
Wesley Coelho, Gail C. Murphy