Sciweavers

254 search results - page 27 / 51
» Risk analysis of software process measurements
Sort
View
ISCA
2010
IEEE
219views Hardware» more  ISCA 2010»
14 years 28 days ago
Using hardware vulnerability factors to enhance AVF analysis
Fault tolerance is now a primary design constraint for all major microprocessors. One step in determining a processor’s compliance to its failure rate target is measuring the Ar...
Vilas Sridharan, David R. Kaeli
CSMR
2005
IEEE
14 years 1 months ago
Characterizing the Evolution of Class Hierarchies
Analyzing historical information can show how a software system evolved into its current state, which parts of the system are stable and which have changed more. However, historic...
Tudor Gîrba, Michele Lanza, Stéphane ...
ICST
2009
IEEE
14 years 2 months ago
Predicting Attack-prone Components
GEGICK, MICHAEL CHARLES. Predicting Attack-prone Components with Source Code Static Analyzers. (Under the direction of Laurie Williams). No single vulnerability detection techniqu...
Michael Gegick, Pete Rotella, Laurie A. Williams
ASE
2006
104views more  ASE 2006»
13 years 7 months ago
On the Systematic Analysis of Natural Language Requirements with C
This paper presents CIRCE, an environment for the analysis of natural language requirements. CIRCE is first presented in terms of its architecture, based on a transformational para...
Vincenzo Ambriola, Vincenzo Gervasi
SIS
2004
13 years 9 months ago
Towards a Systematic Development of Secure Systems
In this paper we outline a new process model for security engineering. This process model extends object oriented, use case driven software development by the systematic treatment ...
Ruth Breu, Klaus Burger, Michael Hafner, Gerhard P...