Sciweavers

3889 search results - page 37 / 778
» The Use of Program Dependence Graphs in Software Engineering
Sort
View
COMPSAC
2008
IEEE
14 years 2 months ago
Measuring Network Security Using Bayesian Network-Based Attack Graphs
Given the increasing dependence of our societies on information systems, the overall security of these systems should be measured and improved. Existing work generally focuses on ...
Marcel Frigault, Lingyu Wang
CSMR
1999
IEEE
14 years 1 days ago
Impact of Function Pointers on the Call Graph
Maintenance activities are made more difficult when pointers are heavily used in source code: the programmer needs to build a mental model of memory locations and of the way they ...
Giuliano Antoniol, F. Calzolari, Paolo Tonella
APSEC
2008
IEEE
14 years 2 months ago
Correctness of Request Executions in Online Updates of Concurrent Object Oriented Programs
Online update is a technique that reduces the disruption caused by a software update. It does so by applying a patch to a running process as opposed to shutting down the process a...
Yogesh Murarka, Umesh Bellur
CGO
2006
IEEE
13 years 11 months ago
2D-Profiling: Detecting Input-Dependent Branches with a Single Input Data Set
Static compilers use profiling to predict run-time program behavior. Generally, this requires multiple input sets to capture wide variations in run-time behavior. This is expensiv...
Hyesoon Kim, M. Aater Suleman, Onur Mutlu, Yale N....
AOSD
2009
ACM
14 years 2 months ago
Dependent advice: a general approach to optimizing history-based aspects
Many aspects for runtime monitoring are history-based: they contain pieces of advice that execute conditionally, based on the observed execution history. History-based aspects are...
Eric Bodden, Feng Chen, Grigore Rosu