Sciweavers

1051 search results - page 190 / 211
» Protocols in the use of empirical software engineering artif...
Sort
View
GECCO
2009
Springer
191views Optimization» more  GECCO 2009»
14 years 3 months ago
Evolvable malware
The concept of artificial evolution has been applied to numerous real world applications in different domains. In this paper, we use this concept in the domain of virology to ev...
Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Mu...
ISSTA
2006
ACM
14 years 2 months ago
Producing scheduling that causes concurrent programs to fail
A noise maker is a tool that seeds a concurrent program with conditional synchronization primitives (such as yield()) for the purpose of increasing the likelihood that a bug manif...
Yosi Ben-Asher, Yaniv Eytani, Eitan Farchi, Shmuel...
PLDI
2010
ACM
14 years 1 months ago
An analysis of the dynamic behavior of JavaScript programs
The JavaScript programming language is widely used for web programming and, increasingly, for general purpose computing. As such, improving the correctness, security and performan...
Gregor Richards, Sylvain Lebresne, Brian Burg, Jan...
EUROSYS
2010
ACM
14 years 1 months ago
Residue objects: a challenge to web browser security
A complex software system typically has a large number of objects in the memory, holding references to each other to implement an object model. Deciding when the objects should be...
Shuo Chen, Hong Chen, Manuel Caballero
ICSOC
2004
Springer
14 years 2 months ago
Knowledge-driven interactions with services across ad hoc networks
Service oriented computing, with its aim of unhindered interoperability, is an appropriate paradigm for ad hoc networks, which are characterized by physical mobility of heterogeno...
Rohan Sen, Radu Handorean, Gruia-Catalin Roman, Gr...