Sciweavers

1466 search results - page 240 / 294
» Completeness of the Authentication Tests
Sort
View
ECRTS
2008
IEEE
14 years 2 months ago
Temporal Analysis for Adapting Concurrent Applications to Embedded Systems
Embedded services and applications that interact with the real world often, over time, need to run on different kinds of hardware (low-cost microcontrollers to powerful multicore ...
Sibin Mohan, Johannes Helander
RV
2007
Springer
151views Hardware» more  RV 2007»
14 years 1 months ago
Instrumentation of Open-Source Software for Intrusion Detection
A significant number of cyber assaults are attempted against open source internet support software written in C, C++, or Java. Examples of these software packages include the Apac...
William R. Mahoney, William L. Sousan
ECMDAFA
2005
Springer
130views Hardware» more  ECMDAFA 2005»
14 years 1 months ago
Control Flow Analysis of UML 2.0 Sequence Diagrams
This article presents a control flow analysis methodology based on UML 2.0 sequence diagrams (SD). In contrast to the conventional code-based control flow analysis techniques, thi...
Vahid Garousi, Lionel C. Briand, Yvan Labiche
SIGUCCS
2003
ACM
14 years 1 months ago
Using a course management system to create a training course for student employees
The User Services unit of Information Technologies at the University of Delaware operates nine public computing facilities and employs about 150 students who work as assistants in...
Cindy Guerrazzi, Kate Webster
ICSE
2010
IEEE-ACM
14 years 17 days ago
Adaptive bug isolation
Statistical debugging uses lightweight instrumentation and statistical models to identify program behaviors that are strongly predictive of failure. However, most software is most...
Piramanayagam Arumuga Nainar, Ben Liblit