Sciweavers

ACSAC
2004
IEEE
14 years 4 months ago
The Trustworthy Computing Security Development Lifecycle
This paper discusses the Trustworthy Computing Security Development Lifecycle (or simply the SDL), a process that Microsoft has adopted for the development of software that needs ...
Steven B. Lipner
ACMSE
2004
ACM
14 years 4 months ago
Methods for the prevention, detection and removal of software security vulnerabilities
Over the past decade, the need to build secure software has become a dominant goal in software development. Consequently, software researchers and practitioners have identified wa...
Jay-Evan J. Tevis, John A. Hamilton Jr.
GROUP
2007
ACM
14 years 4 months ago
Supporting collaborative software development through the visualization of socio-technical dependencies
One of the reasons large-scale software development is difficult is the number of dependencies that software engineers face. These dependencies create a need for communication and...
Cleidson R. B. de Souza, Stephen Quirk, Erik Train...
SSIRI
2010
14 years 4 months ago
Recent Catastrophic Accidents: Investigating How Software was Responsible
Areas crucial to life such as medicine, transportation, nuclearenergy research and industry, aeronautics, and others, all make use of software in one way or another. However, the ...
W. Eric Wong, Vidroha Debroy, Adithya Surampudi, H...
EXPCS
2007
14 years 4 months ago
EXACT: the experimental algorithmics computational toolkit
In this paper, we introduce EXACT, the EXperimental Algorithmics Computational Toolkit. EXACT is a software framework for describing, controlling, and analyzing computer experimen...
William E. Hart, Jonathan W. Berry, Robert T. Heap...
EUROSYS
2007
ACM
14 years 4 months ago
Dynamic updates: another middleware service?
Middleware simplifies the construction of distributed applications. These applications typically require continuous uptime. The maintenance of distributed applications, though, im...
Susanne Cech Previtali
ESEM
2007
ACM
14 years 4 months ago
How Software Designs Decay: A Pilot Study of Pattern Evolution
A common belief is that software designs decay as systems evolve. This research examines the extent to which software designs actually decay by studying the aging of design patter...
Clemente Izurieta, James M. Bieman
COMSWARE
2007
IEEE
14 years 4 months ago
Robust and Efficient Software Management in Sensor Networks
Software deployment and updating of deployed code is a critical topic in the area of wireless sensor networks (WSN). Reasons are unreliable network connectivity, resource limitatio...
Wolfgang Schröder-Preikschat, Rüdiger Ka...
SIGDOC
1992
ACM
14 years 4 months ago
Documenting software systems with views
Softwareprofessionals rely on internaldocumentationas an aid in understanding programs. Unfortunately, the documentation for most programs is usually out-of-date and cannot be tru...
Scott R. Tilley, Hausi A. Müller, Mehmet A. O...
ISSTA
1993
ACM
14 years 4 months ago
Faults on Its Sleeve: Amplifying Software Reliability Testing
Most of the effort that goes into improving the quality of software paradoxically does not lead to quantitative, measurable quality. Software developers and quality-assurance orga...
Richard G. Hamlet, Jeffrey M. Voas