Sciweavers

3667 search results - page 211 / 734
» Software Rejuvenation - Modeling and Analysis
Sort
View
111
Voted
EMSOFT
2010
Springer
15 years 1 months ago
Load-based schedulability analysis of certifiable mixed-criticality systems
Many safety-critical embedded systems are subject to certification requirements. However, only a subset of the functionality of the system may be safety-critical and hence subject...
Haohan Li, Sanjoy K. Baruah
123
Voted
SCAM
2008
IEEE
15 years 10 months ago
The Evolution and Decay of Statically Detected Source Code Vulnerabilities
The presence of vulnerable statements in the source code is a crucial problem for maintainers: properly monitoring and, if necessary, removing them is highly desirable to ensure h...
Massimiliano Di Penta, Luigi Cerulo, Lerina Aversa...
160
Voted
SOSE
2008
IEEE
15 years 10 months ago
Towards SOA-Based Code Defect Analysis
Static code analysis is the analysis of software that is performed to acquire information concerning the dynamic behavior of programs built from that software, without actually ex...
Qianxiang Wang, Na Meng, Zhiyi Zhou, Jinhui Li, Ho...
128
Voted
SCAM
2005
IEEE
15 years 9 months ago
Pointer Analysis for Source-to-Source Transformations
We present a pointer analysis algorithm designed for source-to-source transformations. Existing techniques for pointer analysis apply a collection of inference rules to a dismantl...
Marcio Buss, Stephen A. Edwards, Bin Yao, Dan G. W...
98
Voted
PPPJ
2004
ACM
15 years 9 months ago
Visualization and analysis of phased behavior in Java programs
To enable analysis and visualization of phased behavior in Java programs and to facilitate optimization development, we have implemented a freely-available, phase analysis framewo...
Priya Nagpurkar, Chandra Krintz