Sciweavers

3667 search results - page 71 / 734
» Software Rejuvenation - Modeling and Analysis
Sort
View
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
14 years 2 months ago
Computational Evaluation of Software Security Attributes
In the current state of practice, security properties of software systems are typically assessed through subjective, labor-intensive human evaluation. Moreover, much of the quanti...
Gwendolyn H. Walton, Thomas A. Longstaff, Richard ...
EUROSYS
2008
ACM
14 years 4 months ago
Hang analysis: fighting responsiveness bugs
Xi Wang, Zhenyu Guo, Xuezheng Liu, Zhilei Xu, Haox...
CODES
2008
IEEE
14 years 2 months ago
Reliable performance analysis of a multicore multithreaded system-on-chip
Simon Schliecker, Mircea Negrean, Gabriela Nicoles...
SCAM
2008
IEEE
14 years 2 months ago
Analysis and Transformations for Efficient Query-Based Debugging
Michael Gorbovitski, K. Tuncay Tekle, Tom Rothamel...
SCAM
2002
IEEE
14 years 17 days ago
VADA: A Transformation-Based System for Variable Dependence Analysis
Mark Harman, Chris Fox, Robert M. Hierons, Lin Hu,...