Sciweavers

2236 search results - page 393 / 448
» Intrusion detection techniques and approaches
Sort
View
ICSM
2006
IEEE
14 years 3 months ago
Using the Case-Based Ranking Methodology for Test Case Prioritization
The test case execution order affects the time at which the objectives of testing are met. If the objective is fault detection, an inappropriate execution order might reveal most ...
Paolo Tonella, Paolo Avesani, Angelo Susi
LCN
2006
IEEE
14 years 3 months ago
Flexible Flow Aggregation for Adaptive Network Monitoring
Network monitoring is a major building block for many domains in communication networks. Besides typical accounting mechanisms and the emerging area of charging in next generation...
Falko Dressler, Gerhard Münz
APSEC
2005
IEEE
14 years 2 months ago
Simulation-based Validation and Defect Localization for Evolving, Semi-Formal Requirements Models
When requirements models are developed in an iterative and evolutionary way, requirements validation becomes a major problem. In order to detect and fix problems early, the speci...
Christian Seybold, Silvio Meier
PASTE
2005
ACM
14 years 2 months ago
Low overhead program monitoring and profiling
Program instrumentation, inserted either before or during execution, is rapidly becoming a necessary component of many systems. Instrumentation is commonly used to collect informa...
Naveen Kumar, Bruce R. Childers, Mary Lou Soffa
CC
2004
Springer
110views System Software» more  CC 2004»
14 years 2 months ago
Pruning Interference and Ready Dependence for Slicing Concurrent Java Programs
In this paper, we show how previous work on escape analysis can be adapted and extended to yield a static analysis that is efficient yet effective for reducing the number of inter...
Venkatesh Prasad Ranganath, John Hatcliff