Sciweavers

3667 search results - page 537 / 734
» Software Rejuvenation - Modeling and Analysis
Sort
View
138
Voted
CF
2009
ACM
15 years 1 months ago
High accuracy failure injection in parallel and distributed systems using virtualization
Emulation sits between simulation and experimentation to complete the set of tools available for software designers to evaluate their software and predict behavior under condition...
Thomas Hérault, Thomas Largillier, Sylvain ...
135
Voted
ICSE
2009
IEEE-ACM
15 years 1 months ago
HOLMES: Effective statistical debugging via efficient path profiling
Statistical debugging aims to automate the process of isolating bugs by profiling several runs of the program and using statistical analysis to pinpoint the likely causes of failu...
Trishul M. Chilimbi, Ben Liblit, Krishna K. Mehra,...
124
Voted
ICSE
2009
IEEE-ACM
15 years 1 months ago
Extended eTVRA vs. security checklist: Experiences in a value-web
Abstract--Security evaluation according to ISO 15408 (Common Criteria) is a resource and time demanding activity, as well as being costly. For this reason, only few companies take ...
Ayse Morali, Emmanuele Zambon, Siv Hilde Houmb, Ka...
173
Voted
ICST
2009
IEEE
15 years 1 months ago
Penetration Testing with Improved Input Vector Identification
Penetration testing is widely used to help ensure the security of web applications. It discovers vulnerabilities by simulating attacks from malicious users on a target application...
William G. J. Halfond, Shauvik Roy Choudhary, Ales...
144
Voted
ICST
2009
IEEE
15 years 1 months ago
Test Redundancy Measurement Based on Coverage Information: Evaluations and Lessons Learned
Measurement and detection of redundancy in test suites attempt to achieve test minimization which in turn can help reduce test maintenance costs, and to also ensure the integrity ...
Negar Koochakzadeh, Vahid Garousi, Frank Maurer