Sciweavers

269 search results - page 31 / 54
» Predicting risk of software changes
Sort
View
ACSAC
2000
IEEE
13 years 12 months ago
Security Agility in Response to Intrusion Detection
Cooperative frameworks for intrusion detection and response exemplify a key area of today’s computer research: automating defenses against malicious attacks that increasingly ar...
M. Petkac, Lee Badger
PVM
2004
Springer
14 years 26 days ago
A Performance-Oriented Technique for Hybrid Application Development
In SMP clusters it is not always convenient to switch from pure message-passing code to hybrid software designs that exploit shared memory. This paper tackles the problem of restru...
Emilio Mancini, Massimiliano Rak, Roberto Torella,...
ICSE
2003
IEEE-ACM
14 years 7 months ago
Whole Program Path-Based Dynamic Impact Analysis
Impact analysis, determining when a change in one part of a program affects other parts of the program, is timeconsuming and problematic. Impact analysis is rarely used to predict...
James Law, Gregg Rothermel
ESEM
2010
ACM
13 years 6 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
RV
2009
Springer
155views Hardware» more  RV 2009»
14 years 2 days ago
Hardware Supported Flexible Monitoring: Early Results
Monitoring of software’s execution is crucial in numerous software development tasks. Current monitoring efforts generally require extensive instrumentation of the software or d...
Antonia Zhai, Guojin He, Mats Per Erik Heimdahl