Sciweavers

419 search results - page 28 / 84
» An Automated Approach for Identifying Potential Vulnerabilit...
Sort
View
EUROSYS
2010
ACM
14 years 28 days ago
Fingerprinting the Datacenter: Automated Classification of Performance Crises
When a performance crisis occurs in a datacenter, rapid recovery requires quickly recognizing whether a similar incident occurred before, in which case a known remedy may apply, o...
Peter Bodik, Moises Goldszmidt, Armando Fox, Dawn ...
ICSE
2005
IEEE-ACM
14 years 9 months ago
Tool support for just-in-time architecture reconstruction and evaluation: an experience report
The need for software architecture evaluation has drawn considerable attention in recent years. In practice, this is a challenging exercise for two main reasons. First, in deploye...
Ian Gorton, Liming Zhu
ACSAC
2005
IEEE
14 years 2 months ago
Building Evidence Graphs for Network Forensics Analysis
In this paper, we present techniques for a network forensics analysis mechanism that includes effective evidence presentation, manipulation and automated reasoning. We propose the...
Wei Wang, Thomas E. Daniels
ICSE
2003
IEEE-ACM
14 years 9 months ago
Pattern Oriented Software Development: Moving Seamlessly from Requirements to Architecture
Requirements Engineering (RE) deals with the early phases of software engineering namely requirement elicitation, modeling, specification and validation. Architecture of a softwar...
M. S. Rajasree, P. Jithendra Kumar Reddy, D. Janak...
HICSS
2009
IEEE
131views Biometrics» more  HICSS 2009»
14 years 3 months ago
Challenges in Software Product Line Composition
The idea to develop applications and infrastructure software as software product lines (SPLs) is continuously growing in acceptance throughout the software industry. The ability t...
Horst Schirmeier, Olaf Spinczyk