Sciweavers

224 search results - page 10 / 45
» Software for advanced HRV analysis
Sort
View
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
14 years 2 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
ISSRE
2003
IEEE
14 years 3 months ago
Early Warning of Failures through Alarm Analysis - A Case Study in Telecom Voice Mail Systems
-- This paper presents three principles for alarm analysis to develop early warnings of failure. The concepts are illustrated with real data and experience drawn from Comverse Voic...
Dorron Levy, Ram Chillarege
ISSTA
2012
ACM
12 years 10 days ago
Static memory leak detection using full-sparse value-flow analysis
We introduce a static detector, Saber, for detecting memory leaks in C programs. Leveraging recent advances on sparse pointer analysis, Saber is the first to use a full-sparse va...
Yulei Sui, Ding Ye, Jingling Xue
ACMSE
2004
ACM
14 years 1 months ago
Methods for the prevention, detection and removal of software security vulnerabilities
Over the past decade, the need to build secure software has become a dominant goal in software development. Consequently, software researchers and practitioners have identified wa...
Jay-Evan J. Tevis, John A. Hamilton Jr.
JNW
2007
86views more  JNW 2007»
13 years 9 months ago
Linux Software Router: Data Plane Optimization and Performance Evaluation
- Recent technological advances provide an excellent opportunity to achieve truly effective results in the field of open Internet devices, also known as Open Routers or ORs. Even t...
Raffaele Bolla, Roberto Bruschi