Sciweavers

1131 search results - page 59 / 227
» Performance analysis of BSTs in system software
Sort
View
120
Voted
INFSOF
2007
83views more  INFSOF 2007»
15 years 3 months ago
On the design of more secure software-intensive systems by use of attack patterns
Retrofitting security implementations to a released software-intensive system or to a system under development may require significant architectural or coding changes. These late...
Michael Gegick, Laurie Williams
148
Voted
CASES
2007
ACM
15 years 7 months ago
Performance optimal processor throttling under thermal constraints
We derive analytically, the performance optimal throttling curve for a processor under thermal constraints for a given task sequence. We found that keeping the chip temperature co...
Ravishankar Rao, Sarma B. K. Vrudhula
140
Voted
ICSE
2008
IEEE-ACM
16 years 4 months ago
Predicting defects using network analysis on dependency graphs
In software development, resources for quality assurance are limited by time and by cost. In order to allocate resources effectively, managers need to rely on their experience bac...
Thomas Zimmermann, Nachiappan Nagappan
137
Voted
ECBS
2007
IEEE
135views Hardware» more  ECBS 2007»
15 years 10 months ago
Introducing Impact Analysis for Architectural Decisions
Architectural quality constitutes a critical factor for contemporary software systems, especially because of their size and the needs for frequent, quick changes. For success-crit...
Matthias Riebisch, Sven Wohlfarth
110
Voted
METRICS
1997
IEEE
15 years 8 months ago
An Empirical Analysis of Equivalence Partitioning, Boundary Value Analysis and Random Testing
An experiment comparing the effectiveness of equivalence partitioning (EP), boundary value analysis (BVA), and random testing was performed, based on an operational avionics syste...
Stuart Reid