Sciweavers

1014 search results - page 102 / 203
» Software Development Environments for Scientific and Enginee...
Sort
View
ICSM
2003
IEEE
14 years 2 months ago
Characterizing the 'Security Vulnerability Likelihood' of Software Functions
Software maintainers and auditors would benefit from a tool to help them focus their attention on functions that are likely to be the source of security vulnerabilities. However,...
Dan DaCosta, Christopher Dahn, Spiros Mancoridis, ...
WICSA
2004
13 years 10 months ago
The DiPS+ Software Architecture for Self-healing Protocol Stacks
Research domains such as active networks, ad-hoc networks, ubiquitous computing, pervasive computing, grid computing, and sensor networks, clearly show that computer networks will...
Sam Michiels, Lieven Desmet, Wouter Joosen, Pierre...
CSMR
2002
IEEE
14 years 2 months ago
C to Java Migration Experiences
With the growing popularity of the Java programming language for both client and server side applications in network-centric computing, there is a rising need for programming libr...
Johannes Martin, Hausi A. Müller
CORR
1998
Springer
184views Education» more  CORR 1998»
13 years 8 months ago
Case Study in Survivable Network System Analysis
This paper presents a method for analyzing the survivability of distributed network systems and an example of its application. Survivability is the capability of a system to fulfi...
Robert J. Ellison, Richard C. Linger, Thomas A. Lo...
GECCO
2006
Springer
135views Optimization» more  GECCO 2006»
14 years 24 days ago
Single and multi-objective genetic operators in object-oriented conceptual software design
This poster paper investigates the potential of single and multiobjective genetic operators with an object-oriented conceptual design space. Using cohesion as an objective fitness...
Christopher L. Simons, Ian C. Parmee