Sciweavers

85 search results - page 13 / 17
» Code Roots
Sort
View
ICSE
1999
IEEE-ACM
13 years 11 months ago
Pattern-Based Reverse-Engineering of Design Components
Many reverse-engineering tools have been developed to detract representations from source code. Yet, most of these tools completely ignore recovery of the all-important rationale ...
Rudolf K. Keller, Reinhard Schauer, Sébasti...
CCS
2008
ACM
13 years 9 months ago
Deconstructing new cache designs for thwarting software cache-based side channel attacks
Software cache-based side channel attacks present a serious threat to computer systems. Previously proposed countermeasures were either too costly for practical use or only effect...
Jingfei Kong, Onur Aciiçmez, Jean-Pierre Se...
DSN
2008
IEEE
13 years 9 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
ESEM
2008
ACM
13 years 9 months ago
Phase distribution of software development effort
Effort distribution by phase or activity is an important but often overlooked aspect compared to other steps in the cost estimation process. Poor effort allocation is among the ma...
Ye Yang, Mei He, Mingshu Li, Qing Wang, Barry W. B...
ESANN
2001
13 years 8 months ago
The synergy between multideme genetic algorithms and fuzzy systems
In this article, a real-coded genetic algorithm (GA) is proposed capable of simultaneously optimizing the structure of a system (number of inputs, membership functions and rules) ...
Ignacio Rojas Ruiz, José Luis Bernier, Edua...