Sciweavers

TSE
2010
230views more  TSE 2010»
13 years 6 months ago
Vulnerability Discovery with Attack Injection
The increasing reliance put on networked computer systems demands higher levels of dependability. This is even more relevant as new threats and forms of attack are constantly being...
João Antunes, Nuno Ferreira Neves, Miguel C...
TSE
2010
96views more  TSE 2010»
13 years 6 months ago
Learning Communicating Automata from MSCs
Benedikt Bollig, Joost-Pieter Katoen, Carsten Kern...
TSE
2010
102views more  TSE 2010»
13 years 6 months ago
Understanding Exception Handling: Viewpoints of Novices and Experts
Several recent studies indicate that many industrial applications exhibit poor quality in the design of exception-handling. To improve the quality of error-handling, we need to und...
Hina Shah, Carsten Görg, Mary Jean Harrold
TSE
2010
235views more  TSE 2010»
13 years 6 months ago
DECOR: A Method for the Specification and Detection of Code and Design Smells
Abstract-- Code and design smells are poor solutions to recurring implementation and design problems. They may hinder the evolution of a system by making it hard for software engin...
Naouel Moha, Yann-Gaël Guéhéneu...
TSE
2010
123views more  TSE 2010»
13 years 6 months ago
Directed Explicit State-Space Search in the Generation of Counterexamples for Stochastic Model Checking
Current stochastic model checkers do not make counterexamples for property violations readily available. In this paper we apply directed explicit state space search to discrete- a...
Husain Aljazzar, Stefan Leue
TSC
2010
159views more  TSC 2010»
13 years 6 months ago
A Mathematical Programming Approach for Server Consolidation Problems in Virtualized Data Centers
Today's data centers offer IT services mostly hosted on dedicated physical servers. Server virtualization provides a technical means for server consolidation. Thus, multiple v...
Benjamin Speitkamp, Martin Bichler
TSC
2010
130views more  TSC 2010»
13 years 6 months ago
Secure Abstraction Views for Scientific Workflow Provenance Querying
bstraction Views for Scientific Workflow Provenance Querying Artem Chebotko, Member, IEEE, Shiyong Lu, Senior Member, IEEE, Seunghan Chang, Farshad Fotouhi, Member, IEEE, and Ping ...
Artem Chebotko, Shiyong Lu, Seunghan Chang, Farsha...
TSC
2010
182views more  TSC 2010»
13 years 6 months ago
A Query Rewriting Approach for Web Service Composition
Data-Providing (DP) services allow query-like access to organizations' data via web services. The invocation of a DP service results in the execution of a query over data sour...
Mahmoud Barhamgi, Djamal Benslimane, Brahim Medjah...
TOSN
2010
53views more  TOSN 2010»
13 years 6 months ago
On the interaction of clocks, power, and synchronization in duty-cycled embedded sensor nodes
Thomas Schmid, Roy Shea, Zainul Charbiwala, Jonath...