Software bugs

Results: 1223



#Item
401Concurrent computing / Concurrency control / Software design patterns / Software bugs / Lock / Double-checked locking / Concurrency pattern / FindBugs / Parallel computing / Computing / Computer programming / Software engineering

Outline Introduction Concurrency Bug Patterns Conclusions Finding Concurrency Bugs in Java

Add to Reading List

Source URL: faculty.ycp.edu

Language: English - Date: 2014-08-22 12:24:21
402Software engineering / Stack buffer overflow / Buffer overflow protection / Buffer overflow / Stack / C standard library / Setjmp.h / Denial-of-service attack / Write / Software bugs / Computing / Software quality

Design of a secure system Software Security Holes and Defenses u Follows a ring design.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2001-03-14 14:43:28
403Debuggers / Debugging / Software bugs / D / Allinea Distributed Debugging Tool / Comparison of debuggers / Computer programming / Software engineering / Computing

ivec.org Debugging Parallel Programs with DDT Presented by Rebecca Hartman-Baker STAP Team

Add to Reading List

Source URL: portal.ivec.org

Language: English - Date: 2014-09-05 04:19:01
404Software bugs / Bug tracking system / Heuristic / Linux kernel / Bug / Revision control / Software / Computing / Computer programming

ReLink: Recovering Links between Bugs and Changes Rongxin Wu†, Hongyu Zhang†, Sunghun Kim§ and S.C. Cheung§ † School of Software, Tsinghua University Beijing, China

Add to Reading List

Source URL: www.cse.ust.hk

Language: English - Date: 2012-06-14 09:36:58
405Security / Software bugs / Software testing / Hacking / Vulnerability / Buffer overflow protection / Exploit / Attack / Buffer overflow / Cyberwarfare / Computer security / Computer network security

Relative Vulnerability: An Empirical Assurance Metric Crispin Cowan, PhD CTO, Immunix

Add to Reading List

Source URL: www.homeport.org

Language: English - Date: 2014-06-11 11:49:30
406Safari / WebKit / Google Chrome / IOS / Software / Web browsers / Pwn2Own

Attacking WebKit Applications by exploiting memory corruption bugs Liang Chen @KeenTeam @chenliang0817 About me

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2015-04-02 00:45:05
407Extreme programming / Software testing / Software bugs / Standardized tests / Educational psychology / Test / William Pugh / FindBugs / Graduate Record Examinations / Software development / Software / Education

Microsoft Word - pp19-spacco.doc

Add to Reading List

Source URL: faculty.ycp.edu

Language: English - Date: 2014-08-22 12:24:22
408Mathematical analysis / Software / Statistics / Poisson distribution / ADMB

Fitting N-mixture models with random observer effects in BUGS and ADMB Richard Chandler, Marc Kéry & Hans Skaug, 20 October[removed]Introduction Abundance is the central state variable in much of ecology and its applica

Add to Reading List

Source URL: groups.nceas.ucsb.edu

Language: English - Date: 2013-01-24 17:09:21
409Data types / Software bugs / Computer arithmetic / Type theory / Type safety / Integer overflow / Signedness / Buffer overflow protection / C / Computing / Software engineering / Computer programming

RICH: Automatically Protecting Against Integer-Based Vulnerabilities David Brumley, Tzi-cker Chiueh, Robert Johnson [removed], [removed], [removed] Huijia Lin, Dawn Song [removed]el

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2008-01-28 17:23:31
UPDATE