Sciweavers

WOSP
2004
ACM
14 years 1 months ago
Generating realistic workloads for network intrusion detection systems
While the use of network intrusion detection systems (nIDS) is becoming pervasive, evaluating nIDS performance has been found to be challenging. The goal of this study is to deter...
Spyros Antonatos, Kostas G. Anagnostakis, Evangelo...
WISER
2004
ACM
14 years 1 months ago
Hardware/software co-design for power system test development
Many hardware/software co-design models have been proposed [7, 2, 5, 6] that attempt to address problems in the hardware/software interface, in partitioning the system between har...
Austin Armbruster, Matt Ryan, Xiaoqing Frank Liu, ...
WISER
2004
ACM
14 years 1 months ago
Aikido and software engineering
Aikido is a martial art whose core philosophy is about conflict resolution and taking care of our opponents and ourselves. My experience, and the experience of fellow aikidoists w...
David Socha
WISER
2004
ACM
14 years 1 months ago
Software, architecture, and participatory design
Much work in software architecture has been inspired by work in physical architecture, in particular Alexander’s work on ‘design patterns’. By contrast, Alexander’s work i...
Stephen Rank, Carl O'Coill, Cornelia Boldyreff, Ma...
WISER
2004
ACM
14 years 1 months ago
Effective work practices for software engineering: free/libre open source software development
We review the literature on Free/Libre Open Source Software (FLOSS) development and on software development, distributed work and teams more generally to develop a theoretical mod...
Kevin Crowston, Hala Annabi, James Howison, Chenge...
SIGSOFT
2004
ACM
14 years 1 months ago
Variability management with feature-oriented programming and aspects
This paper presents an analysis of feature-oriented and aspectoriented modularization approaches with respect to variability management as needed in the context of system families...
Mira Mezini, Klaus Ostermann
SIGSOFT
2004
ACM
14 years 1 months ago
Verifying aspect advice modularly
Aspect-oriented programming has become an increasingly important means of expressing cross-cutting program abstractions. Despite this, aspects lack support for computeraided veri...
Shriram Krishnamurthi, Kathi Fisler, Michael Green...
SIGSOFT
2004
ACM
14 years 1 months ago
Correlation exploitation in error ranking
Static program checking tools can find many serious bugs in software, but due to analysis limitations they also frequently emit false error reports. Such false positives can easi...
Ted Kremenek, Ken Ashcraft, Junfeng Yang, Dawson R...
SIGSOFT
2004
ACM
14 years 1 months ago
A type system for object models
A type system for object models is described that supports subtypes and allows overloading of relation names. No special features need be added to the modelling language; in parti...
Jonathan Edwards, Daniel Jackson, Emina Torlak
SIGSOFT
2004
ACM
14 years 1 months ago
Automating comprehensive safety analysis of concurrent programs using verisoft and TXL
In run-time safety analysis the executions of a concurrent program are monitored and analyzed with respect to safety properties. Similar to testing, run-time analysis is quite e...
Jürgen Dingel, Hongzhi Liang