Sciweavers

3667 search results - page 660 / 734
» Software Rejuvenation - Modeling and Analysis
Sort
View
RAID
2010
Springer
13 years 7 months ago
Automatic Discovery of Parasitic Malware
Malicious software includes functionality designed to block discovery or analysis by defensive utilities. To prevent correct attribution of undesirable behaviors to the malware, it...
Abhinav Srivastava, Jonathon T. Giffin
RV
2010
Springer
172views Hardware» more  RV 2010»
13 years 7 months ago
Recovery Tasks: An Automated Approach to Failure Recovery
Abstract. We present a new approach for developing robust software applications that breaks dependences on the failed parts of an application’s execution to allow the rest of the...
Brian Demsky, Jin Zhou, William Montaz
TOSEM
2010
109views more  TOSEM 2010»
13 years 7 months ago
Modular aspect-oriented design with XPIs
e, or XPI. XPIs abstract crosscutting behaviors and make these abstractions explicit. XPIs can be used, albeit with limited enforcement of interface rules, with existing AOP langua...
Kevin J. Sullivan, William G. Griswold, Hridesh Ra...
TSE
2010
136views more  TSE 2010»
13 years 7 months ago
A Theoretical and Empirical Study of Search-Based Testing: Local, Global, and Hybrid Search
Search based optimization techniques have been applied to structural software test data generation since 1992, with a recent upsurge in interest and activity within this area. How...
Mark Harman, Phil McMinn
TSE
2010
125views more  TSE 2010»
13 years 7 months ago
Engineering a Sound Assertion Semantics for the Verifying Compiler
—The Verifying Compiler (VC) project is a core component of the Dependable Systems Evolution Grand Challenge. The VC offers the promise of automatically proving that a program or...
Patrice Chalin