Sciweavers

138 search results - page 13 / 28
» An empirical methodology for introducing software processes
Sort
View
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
13 years 11 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
TCAD
2010
136views more  TCAD 2010»
13 years 2 months ago
Bounded Model Debugging
Design debugging is a major bottleneck in modern VLSI design flows as both the design size and the length of the error trace contribute to its inherent complexity. With typical des...
Brian Keng, Sean Safarpour, Andreas G. Veneris
ICSE
2007
IEEE-ACM
14 years 7 months ago
Variability Management in Software Product Line Engineering
By explicitly modeling and managing variability, software product line engineering provides a systematic approach for creating a diversity of similar products at low cost, in shor...
Andreas Metzger, Klaus Pohl
ICSE
2009
IEEE-ACM
14 years 8 months ago
In-field healing of integration problems with COTS components
Developers frequently integrate complex COTS frameworks and components in software applications. COTS products are often only partially documented, and developers may misuse techn...
Hervé Chang, Leonardo Mariani, Mauro Pezz&e...
ECBS
2004
IEEE
129views Hardware» more  ECBS 2004»
13 years 11 months ago
Using Feature Modeling for Program Comprehension and Software Architecture Recovery
: The available evidence in a legacy software system, which can help in its understanding and recovery of its architecture are not always sufficient. Very often the system's d...
Ilian Pashov, Matthias Riebisch