Filters








917 Hits in 5.7 sec

Design and Evaluation of "The Missing CS Class, " a Student-led Undergraduate Course to Reduce the Academia-industry Gap

Grant Gilson, Stephen Ott, Noah Rose Ledesma, Aakash Prabhu, Joël Porquet-Lupine
2022 Technical Symposium on Computer Science Education  
This course primarily targets lower-division students and, based on our observations as peer tutors, covers four common but crucial gaps in technical knowledge: (1) Unix-like command-line environments  ...  One notable part of the academia-industry gap is the deficiency in computing ecosystem literacy, which may result in college graduates exhibiting little technical knowledge of software development tools  ...  Module 1: Unix-like command-line environments and tools 4.1.1 Week 1: Unix-like computer systems.  ... 
doi:10.1145/3478431.3499422 dblp:conf/sigcse/GilsonOLPP21 fatcat:efcfj5kolbcrzk2ji6tv6dn4dm

A debugger for distributed programs

R. S. Side, G. C. Shoja
1994 Software, Practice & Experience  
DPD has been tested successfully in debugging distributed programs within a distributed facility called REM (remote execution manager).  ...  Important features of DPD include dynamic roll back and replay, as well as a graphical user interface.  ...  Acknowledgements The authors wish to thank Hausi Müller for reading the original manuscript and Nigel Horspool for his critical reading of the revised manuscript and his valuable comments.  ... 
doi:10.1002/spe.4380240506 fatcat:yokmyo5tozg6zad4o3uo2qy2mi

A taxonomy of computer program security flaws

Carl E. Landwehr, Alan R. Bull, John P. McDermott, William S. Choi
1994 ACM Computing Surveys  
This flaw seems simply to be an error in the implementation of "UUX," though it might be argued that the lack of a standard command line parser in Unix or the lack of a standard, shared set  ...  to be root (via Unix command "chown").  ...  Other flaws contribute to this one: having the mail directory writeable by all users is in itself a questionable approach. Blame could also be placed on the developer of the "chown" function.  ... 
doi:10.1145/185403.185412 fatcat:v6f2sx6cebg2xlmoc5wb6yz434

A constraint-based approach to diagnosing software problems in computer networks [chapter]

Daniel Sabin, Mihaela Sabin, Robert D. Russell, Eugene C. Freuder
1995 Lecture Notes in Computer Science  
This paper presents a case study illustrating the diagnosis of some problems involving the widely used FTP and DNS network software.  ...  FTP Case Study The application protocol chosen for exempli cation is FTP, described in RFC 959 19].  ...  Clearly, the motivation for introducing this variable in the PCSP is that it allows us to embody faulty behaviors in the model.  ... 
doi:10.1007/3-540-60299-2_28 fatcat:aorwthyr4vdbdg4x4q5g6rev3q

Automatic Software Fault Diagnosis by Exploiting Application Signatures

Xiaoning Ding, Hai Huang, Yaoping Ruan, Anees Shaikh, Xiaodong Zhang
2008 USENIX Large Installation Systems Administration Conference  
We implement a diagnostic tool based on this approach and demonstrate its effectiveness in a number of case studies with realistic problems in widely-used applications.  ...  Application problem diagnosis in complex enterprise environments is a challenging problem, and contributes significantly to the growth in IT management costs.  ...  He earned B.S. and M.S. degrees in Electrical Engineering from the University of Virginia, and a Ph.D. in Computer Science and Engineering from the University of Michigan.  ... 
dblp:conf/lisa/DingHRSZ08 fatcat:im3wf3rgibgpjgl7yfbf3lgrbu

A family of code coverage-based heuristics for effective fault localization

W. Eric Wong, Vidroha Debroy, Byoungju Choi
2010 Journal of Systems and Software  
To validate our method case studies were performed on six sets of programs: Siemens suite, Unix suite, space, grep, gzip, and make.  ...  In this paper a code coverage-based method with a family of heuristics is proposed in order to prioritize suspicious code according to its likelihood of containing program bugs.  ...  Acknowledgement We wish to thank Yu Qi and Lei Zhao for proving valuable insights while this paper was a work in progress.  ... 
doi:10.1016/j.jss.2009.09.037 fatcat:7hpjbtlh3jeahcc5v3drcdttsa

A three-fold approach towards increased assurance levels for interactive systems

C. Fayollas, J.-C. Fabre, P. Palanque, M. Cronel, D. Navarre, Y. Deleris
2016 Proceedings of the International Conference on Human-Computer Interaction in Aerospace - HCI-Aero '16  
to interactive systems components (detection of natural faults) and a segregation runtime environment (prevention of faults propagation) We report on the implementation of a Flight Control Unit (FCU)  ...  The approach includes a formal description technique for describing each component of an interactive system (detection and prevention of development faults), a command and monitoring technique dedicated  ...  A Segregated Runtime Environment for the FCUS Our first mockup (see Fig. 11 ) has been developed on a network of 3 computers running UNIX and ARISSIM, an ARINC 653 simulator (see next subsection).  ... 
doi:10.1145/2950112.2964578 dblp:conf/hciaero/FayollasFPCND16 fatcat:nl4547gar5b4doeacbfmyrym5m

An Unorthodox Approach to Undergraduate Software Engineering Instruction

Robert A. Morris
1988 Computing Systems  
The study of mail reading systems of intermediate size proves a suitable environment for the study of complex systems.  ...  Morris and the anonymous referees for suggesting substantial improvements in exposition and to one referee for correcting an important factual error about UNIX mail headers.  ...  In trying to narrow the focus of study, it became clear that studying mail transport agents would present a consequential difficulty in an environment not devoted entirely to the developers: installing  ... 
dblp:journals/csys/Morris88 fatcat:6jy7popjbzcw7e353big25o2se

Using Behavioral Profiles to Detect Software Flaws in Network Servers

Joao Antunes, Nuno Fuentecilla Neves
2011 2011 IEEE 22nd International Symposium on Software Reliability Engineering  
Our detection approach consists in inferring a behavioral profile of a network server that models its correct execution by combining information about the implemented state machine protocol and the server's  ...  This approach was implemented in a tool, which was used to analyze several FTP vulnerabilities, showing that it can effectively find various kinds of flaws.  ...  The same faulty behavior is observed in misconfiguration issues, such as the existence of default accounts.  ... 
doi:10.1109/issre.2011.35 dblp:conf/issre/AntunesN11 fatcat:etgyrjdwwzhprcxam4in6dtie4

Debugging Integrated Systems: An Ethnographic Study of Debugging Practice

Thomas Osterlie, Alf Inge Wang
2007 Conference on Software Maintenance, Proceedings of the  
The results presented in this paper are based on observations from an ethnographic study of the Gentoo OSS community, a geographically distributed community of over 320 developers developing and maintaining  ...  We analyze the practice of debugging integrated systems, identifying five characteristics that set it apart from existing research on debugging: it spans a variety of operating environments, it is collective  ...  To make sense of the faulty machine behavior, the service technicians interact with the customer to create a context for the behavior.  ... 
doi:10.1109/icsm.2007.4362643 dblp:conf/icsm/OsterlieW07 fatcat:pa6vouq5ezb6vpoamvjvbmns7m

A Formal Specification and Validation of a Critical System in Presence of Byzantine Errors [chapter]

S. Gnesi, D. Latella, G. Lenzini, C. Abbaneo, A. Amendola, P. Marmo
2000 Lecture Notes in Computer Science  
This paper describes an experience in formal specification and fault tolerant behavior validation of a railway critical system.  ...  The work, performed in the context of a real industrial project, had the following main targets: (a) to validate specific safety properties in the presence of byzantine system components or of some hardware  ...  Then a byzantine behavior can be modeled as in the following Promela code: Modeling a Temporary Faulty Component.  ... 
doi:10.1007/3-540-46419-0_36 fatcat:nvbgppeud5hcrmi3bs42237sba

Tiptop: Hardware Performance Counters for the Masses

Erven Rohou
2012 2012 41st International Conference on Parallel Processing Workshops  
processes in a multicore environment.  ...  In this paper, we propose that counters be used by all categories of users, in particular non-experts, and we advocate that a few simple metrics derived from these counters are relevant and useful.  ...  Acknowledgements We would like to thank our colleagues from the ALF project-team for the fruitful discussions, as well as the staff operating the compute grid for their support in the collection of data  ... 
doi:10.1109/icppw.2012.58 dblp:conf/icppw/Rohou12 fatcat:v4ies4rhcrdwjeqxxe2vwnwsnu

Long Term Distributed File Reference Tracing: Implementation and Experience

L. Mummert, M. Satyanarayanan
1996 Software, Practice & Experience  
DFSTruce is a system to collect and analyze long-term file reference data in a distributed UNIX workstation environment.  ...  The design of DFSTrace is unique in that it pays particular attention to the efficiency, extensibility and the logistics of long-term trace data collection in a distributed environment.  ...  We are grateful to members of the Coda project for enduring early versions of DFSTrace and using the data in their research, and the many members of the Carnegie Mellon School of Computer Science for allowing  ... 
doi:10.1002/(sici)1097-024x(199606)26:6<705::aid-spe29>3.0.co;2-o fatcat:s73y4wdnsrew3e7btaqq6qvwia

EDFI: A Dependable Fault Injection Tool for Dependability Benchmarking Experiments

Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum
2013 2013 IEEE 19th Pacific Rim International Symposium on Dependable Computing  
Fault injection is a pivotal technique in dependability benchmarking.  ...  Our instrumentation strategy guarantees a predetermined faultload distribution during the entirety of the experiment, independently of the particular system or workload considered.  ...  This DFT can be used to accurately specify the timing of runtime faulty behavior in an execution-driven fashion.  ... 
doi:10.1109/prdc.2013.12 dblp:conf/prdc/GiuffridaKT13 fatcat:2v56mzd6ubb4dlqypm2mkyn2hy

Towards Better Fault Localization: A Crosstab-Based Statistical Approach

W. Eric Wong, Vidroha Debroy, Dianxiang Xu
2012 IEEE Transactions on Systems Man and Cybernetics Part C (Applications and Reviews)  
(in terms of a smaller percentage of executable statements that have to be examined until the first statement containing the fault is reached) than other techniques, such as Tarantula.  ...  Case studies are performed on both small-(the Siemens and Unix suites) and large-sized programs (space, grep, gzip, and make), and results suggest that the crosstab-based technique (CBT) is more effective  ...  Qi for assisting in the collection of the data required for the experiments and providing valuable insights and comments while this paper was a work in progress.  ... 
doi:10.1109/tsmcc.2011.2118751 fatcat:lafwtzgujjeyrljgvd6mnej2ny
« Previous Showing results 1 — 15 out of 917 results