Sciweavers

3792 search results - page 151 / 759
» Techniques for Trusted Software Engineering
Sort
View
141
Voted
ICSE
2008
IEEE-ACM
16 years 4 months ago
Precise memory leak detection for java software using container profiling
A memory leak in a Java program occurs when object references that are no longer needed are unnecessarily maintained. Such leaks are difficult to understand because static analyse...
Guoqing Xu, Atanas Rountev
147
Voted
SIGSOFT
2007
ACM
16 years 4 months ago
Efficient checkpointing of java software using context-sensitive capture and replay
Checkpointing and replaying is an attractive technique that has been used widely at the operating/runtime system level to provide fault tolerance. Applying such a technique at the...
Guoqing Xu, Atanas Rountev, Yan Tang, Feng Qin
SPW
2004
Springer
15 years 9 months ago
Privacy Is Linking Permission to Purpose
Abstract Fabio Massacci1 and Nicola Zannone1 Department of Information and Communication Technology University of Trento - Italy {massacci,zannone} at dit.unitn.it The last years h...
Fabio Massacci, Nicola Zannone
133
Voted
CSMR
2006
IEEE
15 years 10 months ago
A Refactoring-based Tool for Software Component Adaptation
Abstract— Adapting software components usable by a particular application is a crucial issue in software component based technology. In fact, software components can be used in c...
Gautier Bastide
COMPSAC
2005
IEEE
15 years 9 months ago
Reasoning About Software Architecture-Based Regression Testing Through a Case Study
Two main issues need to be covered when dealing with the dependability of component-based systems: quality assurance of reusable software components and quality assurance of the a...
Henry Muccini, Marcio S. Dias, Debra J. Richardson