Sciweavers

419 search results - page 38 / 84
» An Automated Approach for Identifying Potential Vulnerabilit...
Sort
View
SIGSOFT
2000
ACM
14 years 1 months ago
Bugs in the programs
Fuzzing is a well-known black-box approach to the security testing of applications. Fuzzing has many advantages in terms of simplicity and effectiveness over more complex, expensi...
Richard D. Pethia
IJWIS
2008
150views more  IJWIS 2008»
13 years 8 months ago
COTS-based software product line development
ed Abstract: Purpose of this paper Software Product Line (SPL) is at the forefront among the techniques for reducing costs, decreasing schedule time, and ensuring commonality of fe...
Luiz Fernando Capretz, Faheem Ahmed, Shereef Al-Ma...
CORR
2007
Springer
125views Education» more  CORR 2007»
13 years 8 months ago
A Disciplined Approach to Adopting Agile Practices: The Agile Adoption Framework
Many organizations aspire to adopt agile processes to take advantage of the numerous benefits that it offers to an organization. Those benefits include, but are not limited to, qu...
Ahmed Samy Sidky, James D. Arthur, Shawn A. Bohner
CGO
2004
IEEE
14 years 16 days ago
Single-Dimension Software Pipelining for Multi-Dimensional Loops
Traditionally, software pipelining is applied either to the innermost loop of a given loop nest or from the innermost loop to outer loops. In this paper, we propose a threestep ap...
Hongbo Rong, Zhizhong Tang, Ramaswamy Govindarajan...
ADBIS
2001
Springer
112views Database» more  ADBIS 2001»
14 years 1 months ago
Detecting Termination of Active Database Rules Using Symbolic Model Checking
One potential problem of active database applications is the non-termination of rules. Although algorithms have been proposed to detect non-termination, almost all provide a conser...
Indrakshi Ray, Indrajit Ray