Sciweavers

782 search results - page 73 / 157
» Performance Engineering Case Study: Heap Construction
Sort
View
ISESE
2006
IEEE
14 years 1 months ago
Empirical estimates of software availability of deployed systems
We consider empirical evaluation of the availability of the deployed software. Evaluation of real systems is more realistic, more accurate, and provides higher level of confidenc...
Audris Mockus
ICSM
2007
IEEE
14 years 2 months ago
Applying Interface-Contract Mutation in Regression Testing of Component-Based Software
Regression testing, which plays an important role in software maintenance, usually relies on test adequacy criteria to select and prioritize test cases. However, with the wide use...
Shan-Shan Hou, Lu Zhang, Tao Xie, Hong Mei, Jiasu ...
HAIS
2010
Springer
14 years 16 days ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...
PLDI
2009
ACM
14 years 2 months ago
Laminar: practical fine-grained decentralized information flow control
Decentralized information flow control (DIFC) is a promising model for writing programs with powerful, end-to-end security guarantees. Current DIFC systems that run on commodity ...
Indrajit Roy, Donald E. Porter, Michael D. Bond, K...
CGO
2010
IEEE
14 years 2 months ago
Towards program optimization through automated analysis of numerical precision
Reducing the arithmetic precision of a computation has real performance implications, including increased speed, decreased power consumption, and a smaller memory footprint. For s...
Michael D. Linderman, Matthew Ho, David L. Dill, T...