Sciweavers

3667 search results - page 71 / 734
» Software Rejuvenation - Modeling and Analysis
Sort
View
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
15 years 10 months ago
Computational Evaluation of Software Security Attributes
In the current state of practice, security properties of software systems are typically assessed through subjective, labor-intensive human evaluation. Moreover, much of the quanti...
Gwendolyn H. Walton, Thomas A. Longstaff, Richard ...
89
Voted
EUROSYS
2008
ACM
16 years 8 days ago
Hang analysis: fighting responsiveness bugs
Xi Wang, Zhenyu Guo, Xuezheng Liu, Zhilei Xu, Haox...
CODES
2008
IEEE
15 years 9 months ago
Reliable performance analysis of a multicore multithreaded system-on-chip
Simon Schliecker, Mircea Negrean, Gabriela Nicoles...
SCAM
2008
IEEE
15 years 9 months ago
Analysis and Transformations for Efficient Query-Based Debugging
Michael Gorbovitski, K. Tuncay Tekle, Tom Rothamel...
SCAM
2002
IEEE
15 years 8 months ago
VADA: A Transformation-Based System for Variable Dependence Analysis
Mark Harman, Chris Fox, Robert M. Hierons, Lin Hu,...