Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
software maintenance
biblio
On the Effectiveness of Virtualization Based Memory Isolation on Multicore Platforms
Submitted by grigby1 on Wed, 02/21/2018 - 1:37pm
page table maintenance
XMHF
virtualization based memory isolation
virtualisation
Virtual machine monitors
thread identification
storage management
software maintenance
security primitive
security of data
security
Scalability
Resiliency
resilience
pubcrawl
address mapping validation
multiprocessing systems
multicore setting
Multicore processing
multicore platforms
multicore computing security
Multicore Computing
Metrics
memory isolation security
Kernel
Instruction sets
Hardware
fully isolated microcomputing environment
FIMCE
BitVisor
biblio
Characterizing Non-deadlock Concurrency Bug Fixes in Open-source Java Programs
Submitted by grigby1 on Wed, 08/02/2017 - 1:55pm
bug fix
collaboration
composability
concurrency bug
Human behavior
Metrics
pattern locks
pubcrawl
Resiliency
Scalability
software maintenance
biblio
An autonomic approach to extend the business value of a legacy order fulfillment system
Submitted by grigby1 on Mon, 02/27/2017 - 12:54pm
software applications
Manuals
Monitoring
order fulfillment workflow
pubcrawl170107
retailing industry
self-adaptive systems
self-managing systems
service-oriented architecture
legacy software systems
software engineering
software evolution
software maintenance
Software systems
systems interoperability
systems of systems
third party security screening provider
enterprise resource planning
autonomic behavior
Autonomic computing
autonomic control loop design
autonomic software component
Business
business value
Complexity theory
Databases
autonomic approach
ERP systems
error-prone manual process
human error
human monitoring
hybrid systems
legacy multichannel commerce enterprise resource planning system
legacy order fulfillment system
biblio
Towards more accurate multi-label software behavior learning
Submitted by BrandonB on Wed, 05/06/2015 - 2:34pm
modern software system
Training
software vendor
software maintenance
software fault tolerance
Software Behavior Learning
Software algorithms
Software
public domain software
Prediction algorithms
open source programs
multilabel software behavior learning
Multi-label Learning
Baidu
MLL-GA
Ml.KNN
learning (artificial intelligence)
genetic algorithms
genetic algorithm
fault labels
F-measures
execution trace
crash report
Computer crashes
Biological cells
biblio
Static analysis approaches to detect SQL injection and cross site scripting vulnerabilities in web applications: A survey
Submitted by BrandonB on Tue, 05/05/2015 - 10:40am
SQLI
social communications
Software
software development life cycle
software maintenance
software reliability
source code
source code (software)
SQL
SQL injection
Servers
static analysi
static analysis
testing
vulnerabilitie
vulnerability detection
web applicatio
web applications
XSS
legacy Web applications
attack prevention
Cross Site Scripting
cross site scripting vulnerabilities
defensive programming
financial transaction
Guidelines
health problem
internet
Analytical models
malicious users
Manuals
program diagnostics
programming
programming mistakes
security of data
security vulnerabilities
security weaknesses
biblio
An efficient data security system for group data sharing in cloud system environment
Submitted by BrandonB on Mon, 05/04/2015 - 2:55pm
Document Sharing
software reliability
software maintenance
Servers
sensitive information storage
proficient document sharing
privacy concern
Internet connection reliability
group user membership change
group user identity confidentiality
group revocation advanced encryption standard scheme
group data sharing
Group Authorization
encryption
efficient data security system
Dynamic Group
Access Control
document security
document handling
document conservation
data security advanced encryption standard algorithm
data privacy
data encryption
Cryptography
confidentiality
cloud system environment
cloud data centres
Cloud Computing
authorization
authorisation
authentication
« first
‹ previous
1
2
3
4