Sciweavers

953 search results - page 105 / 191
» On the Emulation of Software Faults by Software Fault Inject...
Sort
View
ISSRE
2007
IEEE
13 years 11 months ago
Data Mining Techniques for Building Fault-proneness Models in Telecom Java Software
This paper describes a study performed in an industrial setting that attempts to build predictive models to identify parts of a Java system with a high probability of fault. The s...
Erik Arisholm, Lionel C. Briand, Magnus Fuglerud
DATE
2009
IEEE
151views Hardware» more  DATE 2009»
14 years 4 months ago
pTest: An adaptive testing tool for concurrent software on embedded multicore processors
—More and more processor manufacturers have launched embedded multicore processors for consumer electronics products because such processors provide high performance and low powe...
Shou-Wei Chang, Kun-Yuan Hsieh, Jenq Kuen Lee
IWSEC
2009
Springer
14 years 4 months ago
Tamper-Tolerant Software: Modeling and Implementation
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...
SP
2007
IEEE
14 years 4 months ago
Using Rescue Points to Navigate Software Recovery
We present a new technique that enables software recovery in legacy applications by retrofitting exception-handling capabilities, error virtualization using rescue points. We int...
Stelios Sidiroglou, Oren Laadan, Angelos D. Keromy...
ECBS
2002
IEEE
118views Hardware» more  ECBS 2002»
14 years 3 months ago
On the Relation between Design Contracts and Errors: A Software Development Strategy
When designing a software module or system, a systems engineer must consider and differentiate between how the system responds to external and internal errors. External errors can...
Eivind J. Nordby, Martin Blom, Anna Brunstrom