Sciweavers

1908 search results - page 285 / 382
» How to teach software modeling
Sort
View
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
15 years 8 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
ICSE
2004
IEEE-ACM
16 years 4 months ago
An Experimental, Pluggable Infrastructure for Modular Configuration Management Policy Composition
Building a configuration management (CM) system is a difficult endeavor that regularly requires tens of thousands of lines of code to be written. To reduce this effort, several ex...
Ronald van der Lingen, André van der Hoek
ICSE
2004
IEEE-ACM
16 years 4 months ago
Toward Undoing in Composite Web Services
Cancelling or reversing the effect of a former action is a necessity in most interactive systems. The simplest and most frequent form of this facility is the "undo" comma...
Marie-Claude Gaudel
ESOP
2010
Springer
16 years 1 months ago
Faulty Logic: Reasoning about Fault Tolerant Programs
Transient faults are single-shot hardware errors caused by high energy particles from space, manufacturing defects, overheating, and other sources. Such faults can be devastating f...
Matthew L. Meola and David Walker
MOMPES
2009
IEEE
15 years 10 months ago
Reliable operating modes for distributed embedded systems
Hard real-time embedded distributed systems pose huge demands in their implementation which must contain as few faults as possible. Over the past years, model-driven development a...
Wolfgang Haberl, Stefan Kugele, Uwe Baumgarten