Sciweavers

2835 search results - page 190 / 567
» Imperfect Requirements in Software Development
Sort
View
IEEEICCI
2005
IEEE
14 years 4 months ago
A brain-like computer for cognitive software applications: the Ersatz Brain project
We want to design a suitable computer for the efficient execution of the software now being developed that will display human-like cognitive abilities. Examples of these potential...
J. A. Anderson
COMPSAC
2009
IEEE
14 years 3 months ago
Temporally Robust Software Features for Authorship Attribution
Authorship attribution is used to determine the creator of works among many candidates, playing a vital role in software forensics, authorship disputes and academic integrity inve...
Steven Burrows, Alexandra L. Uitdenbogerd, Andrew ...
IFIP
1989
Springer
14 years 2 months ago
Software Fault Tolerance
The designation “fault tolerant software” has been used for techniques ranging from roll-back and retry to N-version programming, from data mirroring to functional redundancy....
Algirdas Avizienis
DSN
2008
IEEE
14 years 13 days ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
SERA
2010
Springer
13 years 9 months ago
The Software Modeling and Implementation of Reliable Server Pooling and RSPLIB
Abstract—With the growing complexity of software applications, there is an increasing demand for solutions to distribute workload into server pools. Grid Computing provides power...
Xing Zhou, Thomas Dreibholz, Martin Becke, Jobin P...