Sciweavers

6293 search results - page 1188 / 1259
» Information Flow Testing
Sort
View
KBSE
2007
IEEE
14 years 3 months ago
Modeling bug report quality
Software developers spend a significant portion of their resources handling user-submitted bug reports. For software that is widely deployed, the number of bug reports typically ...
Pieter Hooimeijer, Westley Weimer
TPHOL
2007
IEEE
14 years 3 months ago
Using XCAP to Certify Realistic Systems Code: Machine Context Management
Formal, modular, and mechanized verification of realistic systems code is desirable but challenging. Verification of machine context management (a basis of multi-tasking) is one ...
Zhaozhong Ni, Dachuan Yu, Zhong Shao
AIME
2007
Springer
14 years 3 months ago
Variable Selection for Optimal Decision Making
This paper discusses variable selection for medical decision making; in particular decisions regarding when to provide treatment and which treatment to provide. Current variable se...
Lacey Gunter, Ji Zhu, Susan Murphy
CCS
2007
ACM
14 years 3 months ago
Multi-module vulnerability analysis of web-based applications
In recent years, web applications have become tremendously popular, and nowadays they are routinely used in security-critical environments, such as medical, financial, and milita...
Davide Balzarotti, Marco Cova, Viktoria Felmetsger...
CCS
2007
ACM
14 years 3 months ago
Improving vulnerability discovery models
Security researchers are applying software reliability models to vulnerability data, in an attempt to model the vulnerability discovery process. I show that most current work on t...
Andy Ozment
« Prev « First page 1188 / 1259 Last » Next »