Sciweavers

CSMR
2009
IEEE
14 years 6 months ago
EvoSpaces: Multi-dimensional Navigation Spaces for Software Evolution
EvoSpaces is a Swiss-wide research project sponsored by the Hasler foundation. It involves three partners: University of Zurich, University of Lugano and the University of Applied...
Michele Lanza, Harald Gall, Philippe Dugerdil
CSMR
2009
IEEE
14 years 6 months ago
Structural Complexity and Decay in FLOSS Systems: An Inter-repository Study
Past software engineering literature has firmly established that software architectures and the associated code decay over time. Architectural decay is, potentially, a major issu...
Andrea Capiluppi, Karl Beecher
CSMR
2009
IEEE
14 years 6 months ago
Incremental Clone Detection
Nils Göde, Rainer Koschke
CSMR
2009
IEEE
14 years 6 months ago
Static Security Analysis Based on Input-Related Software Faults
It is important to focus on security aspects during the development cycle to deliver reliable software. However, locating security faults in complex systems is difficult and ther...
Csaba Nagy, Spiros Mancoridis
COMPSAC
2009
IEEE
14 years 6 months ago
Real-Time Guarantees in Flexible Advance Reservations
—This paper deals with the problem of scheduling workflow applications with Quality of Service (QoS) constraints, comprising real-time and interactivity constraints, over a servi...
Kleopatra Konstanteli, Dimosthenis Kyriazis, Theod...
COMPSAC
2009
IEEE
14 years 6 months ago
On Information Flow Forensics in Business Application Scenarios
To-date, security analysis techniques focus on the explicit access to data, thereby neglecting information flows happening over covert channels. As a result, critical business so...
Claus Wonnemann, Rafael Accorsi, Günter M&uum...
COMPSAC
2009
IEEE
14 years 6 months ago
A Perspective on Middleware-Oriented Context-Aware Pervasive Systems
The evolving concepts of mobile computing, context-awareness, and ambient intelligence are increasingly influencing user's experience of services. Therefore, the goal of this...
Zakwan Jaroucheh, Xiaodong Liu, Sally Smith
COMPSAC
2009
IEEE
14 years 6 months ago
SN2K Attacks and Honest Services
—In this paper, we define and illustrate a new form of attack in the context of software services: the software-based need-to-know (SN2K) attack. SN2K attacks can be carried out...
Ashish Kundu
COMPSAC
2009
IEEE
14 years 6 months ago
Respecting Temporal Constraints in Virtualised Services
This paper reports some experiences in providing service guarantees to real-time (RT) applications running in a Virtual Machine (VM), showing how proper scheduling is a necessary ...
Tommaso Cucinotta, Gaetano Anastasi, Luca Abeni
COMPSAC
2009
IEEE
14 years 6 months ago
Penetration Testing for Spam Filters
Despite all the advances on techniques to block spam e-mail messages we still receive them on a frequent basis. This is due mainly to the ability of the spammers to modify the mes...
Yugesh Madhavan, João W. Cangussu, Ram Dant...