• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,943
Next 10 →

educational wargaming: Design flaw

by Anders Frank
"... Unexpected game calculations in ..."
Abstract - Add to MetaCart
Unexpected game calculations in

Automating Design Flaw . . .

by Iulian Dragos , 2003
"... ..."
Abstract - Add to MetaCart
Abstract not found

Automated Detection of Likely Design Flaws in Layered Architectures

by Aditya Budi, David Lo, Lingxiao Jiang, Shaowei Wang
"... Layered architecture prescribes a good principle for sep-arating concerns to make systems more maintainable. One example of such layered architectures is the separation of classes into three groups: Boundary, Control, and Entity, which are referred to as the three analysis class stereo-types in UML. ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
of classes are often missing, thus detection of design flaws becomes non-trivial. In this paper, we provide a framework that automatically labels classes as Boundary, Control, or Entity, and detects design flaws of the rules associated with each stereotype. Our evaluation with programs developed by both

Detection strategies: Metrics-based rules for detecting design flaws

by Radu Marinescu - In Proc. IEEE International Conference on Software Maintenance , 2004
"... In order to support the maintenance of an objectoriented software system, the quality of its design must be evaluated using adequate quantification means. In spite of the current extensive use of metrics, if used in isolation metrics are oftentimes too fine grained to quantify comprehensively an inv ..."
Abstract - Cited by 105 (6 self) - Add to MetaCart
principles and heuristics. Using detection strategies an engineer can directly localize classes or methods affected by a particular design flaw (e.g., God Class), rather than having to infer the real design problem from a large set of abnormal metric values. We have defined such detection strategies

Using History Information to Improve Design Flaws Detection

by Stéphane Ducasse, Tudor Gîrba, Radu Marinescu - CSMR 2004: 8TH EUROPEAN CONFERENCE ON SOFTWARE MAINTENANCE AND REENGINEERING , 2004
"... As systems evolve and their structure decays, maintainers need accurate and automatic identification of the design problems. Current approaches for automatic detection of design problems are not accurate enough because they analyze only a single version of a system and consequently they miss essenti ..."
Abstract - Cited by 43 (9 self) - Add to MetaCart
essential information as design problems appear and evolve over time. Our approach is to use the historical information of the suspected flawed structure to increase the accuracy of the automatic problem detection. Our means is to define measurements which summarize how persistent the problem was and how

Detecting Design Flaws via Metrics in Object-Oriented Systems

by Radu Marinescu - In Proceedings of TOOLS , 2001
"... The industry is nowadays confronted with large-scale monolithic and inflexible object-oriented software. Because of their high business value, these legacy systems must be reengineered. One of the important issues in reengineering is the detection and location of the design flaws, which prevent an e ..."
Abstract - Cited by 33 (5 self) - Add to MetaCart
The industry is nowadays confronted with large-scale monolithic and inflexible object-oriented software. Because of their high business value, these legacy systems must be reengineered. One of the important issues in reengineering is the detection and location of the design flaws, which prevent

Analyzing Websites for User-Visible Security Design Flaws ABSTRACT

by Laura Falk
"... An increasing number of people rely on secure websites to carry out their daily business. A survey conducted by Pew Internet states 42 % of all internet users bank online. Considering the types of secure transactions being conducted, businesses are rigorously testing their sites for security flaws. ..."
Abstract - Cited by 11 (0 self) - Add to MetaCart
. In spite of this testing, some design flaws still remain that prevent secure usage. In this paper, we examine the prevalence of user-visible security design flaws by looking at sites from 214 U.S. financial institutions. We specifically chose financial websites because of their high security requirements

Strategy Based Elimination of Design Flaws in Object-Oriented Systems

by Adrian Trifu, Iulian Dragos
"... Due to frequent requirements changes, extensions of functionality, as well as continuous adaptation to changing environments, the designs of large software systems continually degrade. In the context of object--oriented software restructuring, we show that there is still an important gap between ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
the design flaw detection and correction phases, as well as an acute lack of rigorously defined correction methodologies and appropriate tools. In this paper, we state a number of important criteria that have to be fulfilled by any such approach. The novel notion of "correction strategy

Shielding against Design Flaws with Field Repairable Control Logic

by Ilya Wagner, Valeria Bertacco, Todd Austin - Control Logic”, Proc. Design Automation Conference (DAC , 2006
"... Correctness is a paramount attribute of any microprocessor design; however, without novel technologies to tame the increasing complexity of design verification, the amount of bugs that escape into silicon will only grow in the future. In this paper, we propose a novel hardware patching mechanism tha ..."
Abstract - Cited by 21 (7 self) - Add to MetaCart
-verified degraded performance mode, once a ”match ” occurs. When the instructions exposing the design flaw are committed, the processor is switched back to normal mode. We show that our approach can detect and correct infrequently-occurring errors with almost no performance impact and has approximately 2 % area

Applying Frequent Sequence Mining to Identify Design Flaws in Enterprise Software Systems

by Trevor Parsons, John Murphy - In Proceedings 5th International Conference on Machine Learning and Data Mining (poster track , 2007
"... Abstract. In this paper we show how frequent sequence mining (FSM) can be applied to data produced by monitoring distributed enterprise applications. In particular we show how we applied FSM to run-time paths to highlight repeating sequences of interest by using alternative support counting techniqu ..."
Abstract - Cited by 2 (2 self) - Add to MetaCart
techniques. We show how the patterns identified, can be used to highlight design flaws in enterprise applications. We also discuss some algorithm scalability problems related to applying FSM to run-time paths and give solutions to these issues. 1
Next 10 →
Results 1 - 10 of 1,943
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University