Sciweavers

2255 search results - page 134 / 451
» High Assurance Software Systems
Sort
View
ASE
1999
90views more  ASE 1999»
13 years 9 months ago
A Concept Formation Based Approach to Object Identification in Procedural Code
Legacy software systems present a high level of entropy combined with imprecise documentation. This makes their maintenance more difficult, more time consuming, and costlier. In or...
Houari A. Sahraoui, Hakim Lounis, Walcélio ...
HPCA
1999
IEEE
14 years 2 months ago
Comparative Evaluation of Fine- and Coarse-Grain Approaches for Software Distributed Shared Memory
Symmetric multiprocessors (SMPs) connected with low-latency networks provide attractive building blocks for software distributed shared memory systems. Two distinct approaches hav...
Sandhya Dwarkadas, Kourosh Gharachorloo, Leonidas ...
JSS
2006
153views more  JSS 2006»
13 years 10 months ago
Towards the automatic generation of mobile agents for distributed intrusion detection system
The Mobile Agent Intrusion Detection System (MAIDS) is an agent based distributed Intrusion Detection System (IDS). A disciplined requirement engineering process is developed to b...
Yanxin Wang, Smruti Ranjan Behera, Johnny Wong, Gu...
EUROSYS
2006
ACM
14 years 7 months ago
Reducing TCB complexity for security-sensitive applications: three case studies
The large size and high complexity of securitysensitive applications and systems software is a primary cause for their poor testability and high vulnerability. One approach to all...
Lenin Singaravelu, Calton Pu, Hermann Härtig,...
EUROPLOP
2006
13 years 11 months ago
A Pattern Language for Overlay Networks in Peer-to-Peer Systems
Peer-to-peer systems typically operate in large-scale, highly unreliable and insecure environments. Tackling this complexity requires good software design. Yet, many peer-to-peer ...
Dominik Grolimund, Peter Muller