Sciweavers

241 search results - page 29 / 49
» Predicting vulnerable software components
Sort
View
JBCB
2006
60views more  JBCB 2006»
13 years 7 months ago
Efficient Algorithms and Software for Detection of Full-length Ltr Retrotransposons
LTR retrotransposons constitute one of the most abundant classes of repetitive elements in eukaryotic genomes. In this paper, we present a new algorithm for detection of full-leng...
Anantharaman Kalyanaraman, Srinivas Aluru
EWSN
2008
Springer
14 years 7 months ago
FiGaRo: Fine-Grained Software Reconfiguration for Wireless Sensor Networks
Wireless Sensor Networks (WSNs) are increasingly being proposed in scenarios whose requirements cannot be fully predicted, or where the system functionality must adapt to changing ...
Luca Mottola, Gian Pietro Picco, Adil Amjad Sheikh
ICSE
2009
IEEE-ACM
14 years 2 months ago
Using quantitative analysis to implement autonomic IT systems
The software underpinning today’s IT systems needs to adapt dynamically and predictably to rapid changes in system workload, environment and objectives. We describe a software f...
Radu Calinescu, Marta Z. Kwiatkowska
IUI
1998
ACM
13 years 12 months ago
CyberDesk: A Framework for Providing Self-integrating Context-aware Services
Applications are often designed to take advantage of the potential for integration with each other via shared information. Current approaches for integration are limited, affectin...
Anind K. Dey, Gregory D. Abowd, Andrew Wood
ISSRE
2010
IEEE
13 years 6 months ago
Change Bursts as Defect Predictors
—In software development, every change induces a risk. What happens if code changes again and again in some period of time? In an empirical study on Windows Vista, we found that ...
Nachiappan Nagappan, Andreas Zeller, Thomas Zimmer...