Sciweavers

3667 search results - page 218 / 734
» Software Rejuvenation - Modeling and Analysis
Sort
View
103
Voted
ICSE
2007
IEEE-ACM
16 years 3 months ago
Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis
This paper presents an approach to statically retrofit legacy servers with mechanisms for authorization policy enforcement. The approach is based upon the observation that securit...
Vinod Ganapathy, Dave King 0002, Trent Jaeger, Som...
PPPJ
2009
ACM
15 years 10 months ago
Actor frameworks for the JVM platform: a comparative analysis
The problem of programming scalable multicore processors has renewed interest in message-passing languages and frameworks. Such languages and frameworks are typically actororiente...
Rajesh K. Karmani, Amin Shali, Gul Agha
146
Voted
ICSE
2009
IEEE-ACM
15 years 10 months ago
DYVISE: Performance analysis of production systems research demonstration
Many of today’s complex systems are multithreaded servers that effectively run forever and need to work under varying loads and environments. Understanding the behavior of such ...
Steven P. Reiss
93
Voted
COMPSAC
2005
IEEE
15 years 9 months ago
Buffer Overrun Prevention Through Component Composition Analysis
Buffer overrun vulnerabilities cause significant security problems, and have proven to be difficult to prevent. In this paper we present a novel approach to tackling the problem...
David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob...
125
Voted
WOSP
2005
ACM
15 years 9 months ago
From StoCharts to MoDeST: a comparative reliability analysis of train radio communications
StoCharts have been proposed as a UML statechart extension for performance and dependability evaluation, and have been applied in the context of train radio reliability assessment...
Holger Hermanns, David N. Jansen, Yaroslav S. Usen...