Sciweavers

1516 search results - page 123 / 304
» Trends in Software Verification
Sort
View
122
Voted
SCAM
2008
IEEE
15 years 9 months ago
The Evolution and Decay of Statically Detected Source Code Vulnerabilities
The presence of vulnerable statements in the source code is a crucial problem for maintainers: properly monitoring and, if necessary, removing them is highly desirable to ensure h...
Massimiliano Di Penta, Luigi Cerulo, Lerina Aversa...
123
Voted
SIGSOFT
1998
ACM
15 years 7 months ago
Formal Modeling and Analysis of the HLA Component Integration Standard
An increasingly important trend in the engineering of complex systems is the design of component integration standards. Such standards de ne rules of interaction and shared commun...
Robert Allen, David Garlan
138
Voted
ESEM
2007
ACM
15 years 7 months ago
Developing Search Strategies for Detecting Relevant Experiments for Systematic Reviews
Information retrieval is an important problem in any evidence-based discipline. Although Evidencebased Software Engineering (EBSE) is not immune to this fact, this question has no...
Óscar Dieste Tubío, Anna Grimá...
130
Voted
AIS
2006
Springer
15 years 3 months ago
"Carnivore personal edition": exploring distributed data surveillance
The goal of this paper is to offer, in straight forward terms, some practical insight into distributed data surveillance. I will use the software project Carnivore as a case study....
Alexander R. Galloway
SIGSOFT
2003
ACM
16 years 4 months ago
Towards scalable compositional analysis by refactoring design models
Automated finite-state verification techniques have matured considerably in the past several years, but state-space explosion remains an obstacle to their use. Theoretical lower b...
Yung-Pin Cheng, Michal Young, Che-Ling Huang, Chia...