Software bugs

Results: 1223



#Item
151Procedural programming languages / Cross-platform software / Build automation / Make / C / Macro / Computing / Computer programming / Software

The keyval package∗ David CarlisleThis file is maintained by the LATEX Project team. Bug reports can be opened (category graphics) at http://latex-project.org/bugs.html.

Add to Reading List

Source URL: mirror.easyname.at

Language: English - Date: 2015-04-12 16:25:32
152Computer programming / Software quality / Concurrency control / Transaction processing / Actor model / Concurrency / Thread / Time of check to time of use / Vulnerability / Computing / Software bugs / Concurrent computing

Concurrency Attacks Junfeng Yang, Ang Cui, Sal Stolfo, Simha Sethumadhavan {junfeng, ang, sal, simha}cs.columbia.edu Department of Computer Science Columbia University

Add to Reading List

Source URL: www.redballoonsecurity.com

Language: English - Date: 2014-02-27 21:40:35
153Software bugs / Control flow / Infinite loop / For loop / Debugging / Boolean data type / Stack / Computer programming / Software engineering / Computing

C ARAMEL: Detecting and Fixing Performance Problems That Have Non-Intrusive Fixes Adrian Nistor1 , Po-Chun Chang2 , Cosmin Radoi3 , Shan Lu4 1 Chapman 2 University

Add to Reading List

Source URL: www1.chapman.edu

Language: English - Date: 2015-03-08 18:18:51
154Software bugs / Control flow / Infinite loop / For loop / Debugging / Boolean data type / Stack / Computer programming / Software engineering / Computing

C ARAMEL: Detecting and Fixing Performance Problems That Have Non-Intrusive Fixes Adrian Nistor1 , Po-Chun Chang2 , Cosmin Radoi3 , Shan Lu4 1 Chapman 2 University

Add to Reading List

Source URL: people.cs.uchicago.edu

Language: English - Date: 2015-03-08 18:18:51
155Data management / Software bug / Lock / Linearizability / Parallel computing / Thread / Serializability / Mutual exclusion / Kernel / Concurrency control / Computing / Transaction processing

AI: A Lightweight System for Tolerating Concurrency Bugs Mingxing Zhang1 Yongwei Wu1 Shan Lu2,∗ Shanxiang Qi3,† Jinglei Ren1 Weimin Zheng1 1 Tsinghua National Laboratory for Information Science and Technology, Tsing

Add to Reading List

Source URL: people.cs.uchicago.edu

Language: English - Date: 2014-08-19 10:13:59
156Computer security / Evaluation / Software bugs / Common Criteria / Reliability engineering / Bug tracking system / Vulnerability / Software development process / Usability / Software testing / Software development / Software quality

Chapter 23: System Evaluation and Assurance C H A P TE R 23 System Evaluation and

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-25 10:25:28
157Computer programming / Dangling pointer / Pointer / Stack buffer overflow / Debugging / Memory leak / Lock / Buffer overflow / C dynamic memory allocation / Computing / Software bugs / Software engineering

ConMem: Detecting Severe Concurrency Bugs through an Effect-Oriented Approach Wei Zhang Chong Sun

Add to Reading List

Source URL: people.cs.uchicago.edu

Language: English - Date: 2010-01-19 14:05:40
158Computing / Theoretical computer science / Computer programming / Logic in computer science / Software testing / Linearizability / Race condition / Atomicity / Lock / Software bugs / Transaction processing / Concurrency control

Efficient Concurrency-Bug Detection Across Inputs Dongdong Deng Wei Zhang Shan Lu

Add to Reading List

Source URL: people.cs.uchicago.edu

Language: English - Date: 2013-08-04 18:25:14
159Data / Concurrency control / Software bugs / Databases / Lock / Atomicity / Deadlock / Idempotence / Thread / Computing / Data management / Transaction processing

ConAir: Featherweight Concurrency Bug Recovery Via Single-Threaded Idempotent Execution Wei Zhang1 Marc de Kruijf1,2

Add to Reading List

Source URL: people.cs.uchicago.edu

Language: English - Date: 2013-01-24 18:23:37
160Computing / Software testing / Hacking / Software bugs / Vulnerability / Penetration test / Trojan horse / Flaw hypothesis methodology / JavaScript / Cyberwarfare / Computer network security / Computer security

A Taxonomy CARL of Computer E. LANDWEHR,

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:00:37
UPDATE