Sciweavers

341 search results - page 15 / 69
» Empirical estimates of software availability of deployed sys...
Sort
View
ICST
2010
IEEE
13 years 6 months ago
Searching for a Needle in a Haystack: Predicting Security Vulnerabilities for Windows Vista
—Many factors are believed to increase the vulnerability of software system; for example, the more widely deployed or popular is a software system the more likely it is to be att...
Thomas Zimmermann, Nachiappan Nagappan, Laurie A. ...
DATE
2003
IEEE
76views Hardware» more  DATE 2003»
14 years 25 days ago
Library Functions Timing Characterization for Source-Level Analysis
Execution time estimation of software at source-level is nowadays a crucial phase of the system design flow, especially for portable devices and real-time systems. From a source-...
Carlo Brandolese, William Fornaciari, Fabio Salice...
CMG
2001
13 years 9 months ago
Software That Can Think and Do
Rapid advances in research and technology now allow data analysis and modeling of extremely complex systems. Methods from artificial intelligence (AI) such as Neural Networks have...
Bernard Domanski
ATAL
2007
Springer
14 years 1 months ago
Estimating information value in collaborative multi-agent planning systems
This paper addresses the problem of identifying the value of information held by a teammate on a distributed, multi-agent team. It focuses on a distributed scheduling task in whic...
David Sarne, Barbara J. Grosz
CAISE
2009
Springer
14 years 5 days ago
Goal-Directed Modeling of Self-adaptive Software Architecture
Abstract. Today’s large-scale computing systems are deployed in open, changing and unpredictable environments. To operate reliably, such systems should be able to adapt to new ci...
Shan Tang, Xin Peng, Yijun Yu, Wenyun Zhao