Sciweavers

419 search results - page 3 / 84
» An Automated Approach for Identifying Potential Vulnerabilit...
Sort
View
127
Voted
MICRO
2010
IEEE
153views Hardware» more  MICRO 2010»
15 years 1 months ago
AVF Stressmark: Towards an Automated Methodology for Bounding the Worst-Case Vulnerability to Soft Errors
Soft error reliability is increasingly becoming a first-order design concern for microprocessors, as a result of higher transistor counts, shrinking device geometries and lowering ...
Arun A. Nair, Lizy Kurian John, Lieven Eeckhout
119
Voted
ICSM
2008
IEEE
15 years 10 months ago
Automatically identifying C++0x concepts in function templates
An automated approach to the identification of C++0x concepts in function templates is described. Concepts are part of a new language feature appearing in the next standard for C+...
Andrew Sutton, Jonathan I. Maletic
118
Voted
CF
2007
ACM
15 years 7 months ago
Identifying potential parallelism via loop-centric profiling
The transition to multithreaded, multi-core designs places a greater responsibility on programmers and software for improving performance; thread-level parallelism (TLP) will be i...
Tipp Moseley, Daniel A. Connors, Dirk Grunwald, Ra...
127
Voted
ACMSE
2004
ACM
15 years 7 months ago
Methods for the prevention, detection and removal of software security vulnerabilities
Over the past decade, the need to build secure software has become a dominant goal in software development. Consequently, software researchers and practitioners have identified wa...
Jay-Evan J. Tevis, John A. Hamilton Jr.
117
Voted
ACSAC
2005
IEEE
15 years 9 months ago
Automated and Safe Vulnerability Assessment
As the number of system vulnerabilities multiplies in recent years, vulnerability assessment has emerged as a powerful system security administration tool that can identify vulner...
Fanglu Guo, Yang Yu, Tzi-cker Chiueh