Sciweavers

1051 search results - page 66 / 211
» Protocols in the use of empirical software engineering artif...
Sort
View
DEXAW
2008
IEEE
126views Database» more  DEXAW 2008»
13 years 10 months ago
Incorporating Database Systems into a Secure Software Development Methodology
We have proposed in the past three separate methodologies for secure software development. We have found that they have many common and complementary aspects and we proposed a com...
Eduardo B. Fernández, Jan Jürjens, Nob...
ICSM
2009
IEEE
14 years 3 months ago
Identifying high-level dependence structures using slice-based dependence analysis
This thesis presented a framework of the possible combination of approaches for low-level program slicing-baseddependence analysis and high-level concept assignment. Three combina...
Zheng Li
CGO
2004
IEEE
14 years 18 days ago
Exposing Memory Access Regularities Using Object-Relative Memory Profiling
Memory profiling is the process of characterizing a program's memory behavior by observing and recording its response to specific input sets. Relevant aspects of the program&...
Qiang Wu, Artem Pyatakov, Alexey Spiridonov, Easwa...
ICSE
2007
IEEE-ACM
14 years 9 months ago
Path-Sensitive Inference of Function Precedence Protocols
Function precedence protocols define ordering relations among function calls in a program. In some instances, precedence protocols are well-understood (e.g., a call to pthread mut...
Murali Krishna Ramanathan, Ananth Grama, Suresh Ja...
ICSE
2008
IEEE-ACM
14 years 9 months ago
A tale of four kernels
The Freebsd, gnu/Linux, Solaris, and Windows operating systems have kernels that provide comparable facilities. Interestingly, their code bases share almost no common parts, while...
Diomidis Spinellis