Sciweavers

861 search results - page 29 / 173
» Predicting Attack-prone Components
Sort
View
ICSE
2005
IEEE-ACM
14 years 10 months ago
Use of relative code churn measures to predict system defect density
Software systems evolve over time due to changes in requirements, optimization of code, fixes for security and reliability bugs etc. Code churn, which measures the changes made to...
Nachiappan Nagappan, Thomas Ball
BMCBI
2005
75views more  BMCBI 2005»
13 years 9 months ago
Prediction of a common structural scaffold for proteasome lid, COP9-signalosome and eIF3 complexes
Background: The 'lid' subcomplex of the 26S proteasome and the COP9 signalosome (CSN complex) share a common architecture consisting of six subunits harbouring a so-call...
Hartmut Scheel, Kay Hofmann
ESSOS
2009
Springer
14 years 4 months ago
Toward Non-security Failures as a Predictor of Security Faults and Failures
In the search for metrics that can predict the presence of vulnerabilities early in the software life cycle, there may be some benefit to choosing metrics from the non-security rea...
Michael Gegick, Pete Rotella, Laurie Williams
DATE
2008
IEEE
104views Hardware» more  DATE 2008»
14 years 4 months ago
A Novel Approach for EMI Design of Power Electronics
The placement of passive components significantly influences the EMI behavior of power electronic systems. Particularly filter components are affected by magnetic field coupling r...
Bernd Stube, Bernd Schröder, Eckart Hoene, An...
ICCV
1999
IEEE
14 years 12 months ago
Wallflower: Principles and Practice of Background Maintenance
Background maintenance is a frequent element of video surveillance systems. We develop Wallflower, a threecomponent system for background maintenance: the pixellevel component per...
Kentaro Toyama, John Krumm, Barry Brumitt, Brian M...