Sciweavers

256 search results - page 26 / 52
» On the Placement of Software Mechanisms for Detection of Dat...
Sort
View
COMPSAC
2009
IEEE
13 years 11 months ago
GUI-Based Testing of Boundary Overflow Vulnerability
Boundary overflows are caused by violation of constraints, mostly limiting the range of internal values of a program, and can be provoked by an intruder to gain control of or acce...
Tugkan Tuglular, Can A. Muftuoglu, Özgür...
GI
2004
Springer
14 years 1 months ago
Reliability study of an embedded operating system for industrial applications
: Critical industrial applications or fault tolerant applications need for operating systems (OS) which guarantee a correct and safe behaviour despite the appearance of errors. In ...
Juan Pardo, José Carlos Campelo, Juan Jos&e...
COMPSAC
2001
IEEE
13 years 11 months ago
Exception Handling in Component-Based System Development
Designers of component-based software face two problems related to dealing with abnormal events: developing exception handling at the level of the integrated system and accommodat...
Alexander B. Romanovsky
COMPSAC
2004
IEEE
13 years 11 months ago
Robustness Study of an Embedded Operating System for Industrial Applications
Critical industrial applications or fault tolerant applications need for operating systems (OS) which guarantee a correct and safe behaviour in spite of the appearance of errors. ...
Juan Pardo, José Carlos Campelo, Juan Jos&e...
BMCBI
2010
105views more  BMCBI 2010»
13 years 7 months ago
GWAMA: software for genome-wide association meta-analysis
Background: Despite the recent success of genome-wide association studies in identifying novel loci contributing effects to complex human traits, such as type 2 diabetes and obesi...
Reedik Mägi, Andrew P. Morris