Sciweavers

419 search results - page 34 / 84
» An Automated Approach for Identifying Potential Vulnerabilit...
Sort
View
ICSE
2003
IEEE-ACM
14 years 9 months ago
Fragment Class Analysis for Testing of Polymorphism in Java Software
Testing of polymorphism in object-oriented software may require coverage of all possible bindings of receiver classes and target methods at call sites. Tools that measure this cove...
Atanas Rountev, Ana Milanova, Barbara G. Ryder
ISSA
2008
13 years 10 months ago
The Information Security of a Bluetooth-Enabled Handheld Device
Bluetooth connectivity allows workers to access information anywhere, including both personal and corporate information. Software and applications have been specifically developed...
Frankie Tvrz, Marijke Coetzee
AICCSA
2006
IEEE
102views Hardware» more  AICCSA 2006»
14 years 16 days ago
An Experimental and Industrial Experience: Avoiding Denial of Service via Memory Profiling
Poor memory management leads to memory leaks, which cause significant performance degradation and failure of software. If ignored, such leaks can potentially cause security breach...
Saeed Abu-Nimeh, Suku Nair, Marco F. Marchetti
EUROSYS
2008
ACM
14 years 5 months ago
Documenting and automating collateral evolutions in linux device drivers
The internal libraries of Linux are evolving rapidly, to address new requirements and improve performance. These evolutions, however, entail a massive problem of collateral evolut...
Yoann Padioleau, Julia L. Lawall, René Rydh...
ACMSE
2006
ACM
14 years 2 months ago
Automatic quality assessment of Affymetrix GeneChip data
Computing reliable gene expression levels from microarray experiments is a sophisticated process with many potential pitfalls. Quality control is one of the most important steps i...
Steffen Heber, Beate Sick