Most studies of software evolution have been performed on systems developed within a single company using traditional management techniques. With the widespread availability of se...
Computers are notoriously insecure, in part because application security policies do not map well onto traditional protection mechanisms such as Unix user accounts or hardware pag...
Nickolai Zeldovich, Hari Kannan, Michael Dalton, C...
Every operating system embodies a collection of design decisions. Many of the decisions behind systems have remained unchanged, even as hardware and software have evolved. Operati...
In developing a distributed file system, there are several good reasons for implementing the client file cache manager as a user-level process. These include ease of implementatio...
David C. Steere, James J. Kistler, Mahadev Satyana...
The large size and high complexity of securitysensitive applications and systems software is a primary cause for their poor testability and high vulnerability. One approach to all...