Sciweavers

449 search results - page 36 / 90
» Modernizing Existing Software: A Case Study
Sort
View
COMPSAC
2005
IEEE
14 years 2 months ago
Detecting Intrusions Specified in a Software Specification Language
To protect software against malicious activities, organizations are required to monitor security breaches. Intrusion Detection Systems (IDS) are those kinds of monitoring tools th...
Mohammad Feroz Raihan, Mohammad Zulkernine
ESE
2002
112views Database» more  ESE 2002»
13 years 8 months ago
An Empirical Method for Selecting Software Reliability Growth Models
Estimating remaining defects or failures in software can help test managers make release decisions during testing. Several methods exist to estimate defect content, among them a v...
Catherine Stringfellow, Anneliese Amschler Andrews
ICSM
2003
IEEE
14 years 1 months ago
Characterizing the 'Security Vulnerability Likelihood' of Software Functions
Software maintainers and auditors would benefit from a tool to help them focus their attention on functions that are likely to be the source of security vulnerabilities. However,...
Dan DaCosta, Christopher Dahn, Spiros Mancoridis, ...
ECMDAFA
2010
Springer
132views Hardware» more  ECMDAFA 2010»
13 years 8 months ago
An Integrated Facet-Based Library for Arbitrary Software Components
Reuse is an important means of reducing costs and effort during the development of complex software systems. A major challenge is to find suitable components in a large library wit...
Matthias Schmidt, Jan Polowinski, Jendrik Johannes...
ITSSA
2006
89views more  ITSSA 2006»
13 years 8 months ago
A Methodology for Classifying Self-Organizing Software Systems
: The software industry is faced with the fast growing complexity of IT infrastructures. This makes manual administration increasingly difficult and appears to be the limiting fact...
Klaus Herrmann, Matthias Werner, Gero Mühl