Sciweavers

3330 search results - page 202 / 666
» software 2010
Sort
View
ICSE
2010
IEEE-ACM
14 years 3 months ago
AURA: a hybrid approach to identify framework evolution
Software frameworks and libraries are indispensable to today’s software systems. As they evolve, it is often timeconsuming for developers to keep their code up-to-date, so appro...
Wei Wu, Yann-Gaël Guéhéneuc, Gi...
AOSD
2010
ACM
14 years 5 months ago
Disambiguating aspect-oriented security policies
Many software security policies can be encoded as aspects that identify and guard security-relevant program operations. Bugs in these aspectually-implemented security policies oft...
Micah Jones, Kevin W. Hamlen
SIGCOMM
2010
ACM
13 years 11 months ago
MPAP: virtualization architecture for heterogenous wireless APs
This demonstration shows a novel virtualization architecture, called Multi-Purpose Access Point (MPAP), which can virtualize multiple heterogenous wireless standards based on soft...
Yong He, Ji Fang, Jiansong Zhang, Haichen Shen, Ku...
MSR
2010
ACM
14 years 4 months ago
An extensive comparison of bug prediction approaches
Abstract—Reliably predicting software defects is one of software engineering’s holy grails. Researchers have devised and implemented a plethora of bug prediction approaches var...
Marco D'Ambros, Michele Lanza, Romain Robbes
VIROLOGY
2010
113views more  VIROLOGY 2010»
13 years 9 months ago
A general definition of malware
We propose a general, formal definition of the concept of malware (malicious software) as a single sentence in the language of a certain modal logic. Our definition al thanks to it...
Simon Kramer, Julian C. Bradfield