Sciweavers

761 search results - page 117 / 153
» Reverse engineering MAC
Sort
View
ECLIPSE
2006
ACM
14 years 1 months ago
Lighthouse: coordination through emerging design
Despite the fact that software development is an inherently collaborative activity, a great deal of software development is spent with developers in isolation, working on their ow...
Isabella A. da Silva, Ping Chen, Christopher van d...
ICST
2009
IEEE
14 years 2 months ago
Seasonal Variation in the Vulnerability Discovery Process
Vulnerability discovery rates need to be taken into account for evaluating security risks. Accurate projection of these rates is required to estimate the effort needed to develop ...
HyunChul Joh, Yashwant K. Malaiya
KBSE
2007
IEEE
14 years 2 months ago
Testing concurrent programs using value schedules
Concurrent programs are difficult to debug and verify because of the nondeterministic nature of concurrent executions. A particular concurrency-related bug may only show up under ...
Jun Chen, Steve MacDonald
KBSE
2002
IEEE
14 years 27 days ago
Generative Design Patterns
A design pattern encapsulates the knowledge of object-oriented designers into re-usable artifacts. A design pattern is a descriptive device that fosters software design re-use. Th...
Steve MacDonald, Duane Szafron, Jonathan Schaeffer...
ISSTA
2000
ACM
14 years 10 days ago
Verisim: Formal analysis of network simulations
—Network protocols are often analyzed using simulations. We demonstrate how to extend such simulations to check propositions expressing safety properties of network event traces ...
Karthikeyan Bhargavan, Carl A. Gunter, Moonjoo Kim...