IEEE Software

Results: 1638



#Item
1Theoretical computer science / Information retrieval / Information science / Model checkers / Hashing / Model checking / Ith / SPIN model checker / Bitstate hashing / Cryptographic hash function / Correctness / Applied mathematics

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, # 1 Swarm Verification Techniques Gerard J. Holzmann, Rajeev Joshi, and Alex Groce

Add to Reading List

Source URL: rjoshi.org

Language: English - Date: 2010-09-11 18:27:55
2Computer architecture / System software / Operating system kernels / Linux kernel / Monolithic kernels / Kernel / Loadable kernel module / Protection ring / Operating system / Mach / Rootkit / Mandatory access control

Poster: (SF)2 I - Structure Field Software Fault Isolation Spyridoula Gravani, Zhuojia Shen, John Criswell Department of Computer Science, University of Rochester Email: {sgravani, zshen10, criswell}@cs.rochester.edu Ab

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 06:12:20
3

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 1 Model checking probabilistic and stochastic extensions of the π -calculus

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2008-08-28 05:24:01
    4System software / Computing / Utility software / Computer network security / Computer security / Configuration management / Network architecture / Software-defined networking / Intrusion detection system / Snort / OpenFlow / Traffic flow

    Poster: Flow Inspection Scheduling for Cyber Security on Software-Defined Networks Sunghwan Kim, Seunghyun Yoon, and Hyuk Lim School of Electrical Engineering and Computer Science Gwangju Institute of Science and Technol

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-14 15:46:40
    5

    2014 IEEE International Conference on Software Testing, Verification, and Validation Workshops Functional Dependence and Equivalence Class Factors in Combinatorial Test Designs George B. Sherwood Testcover.com, LLC

    Add to Reading List

    Source URL: testcover.com

    Language: English - Date: 2018-07-14 16:28:06
      6

      1 Comments on “Researcher Bias: The Use of Machine Learning in Software Defect Prediction” Chakkrit Tantithamthavorn, Student Member, IEEE,

      Add to Reading List

      Source URL: chakkrit.com

      Language: English - Date: 2018-07-19 22:33:26
        7

        IEEE NETSOFT 2015 – London, April 13, 2015 From dumb to smarter switches in software defined networks: an overview of data plane evolution Antonio Capone, Carmelo Cascone

        Add to Reading List

        Source URL: www.beba-project.eu

        Language: English - Date: 2015-11-02 06:08:49
          8

          2009 IEEE/ACM International Conference on Automated Software Engineering Adding Examples into Java Documents Jinhan Kim, Sanghoon Lee, Seung-won Hwang Pohang University of Science and Technology Pohang, Korea

          Add to Reading List

          Source URL: www.cse.ust.hk

          Language: English - Date: 2018-02-21 17:47:02
            9

            IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. X, NO. X, MONTHA Multi-Site Joint Replication of a Design Patterns Experiment using Moderator Variables

            Add to Reading List

            Source URL: www.inf.fu-berlin.de

            Language: English - Date: 2017-02-28 09:38:32
              10

              2016 IEEE International Conference on Software Science, Technology and Engineering Identifying Attack Propagation Patterns in Honeypots using Markov Chains Modeling and Complex Networks Analysis Ariel Bar, Bracha Shapi

              Add to Reading List

              Source URL: cyber.bgu.ac.il

              Language: English - Date: 2017-10-26 13:42:18
                UPDATE