Filters








10 Hits in 7.8 sec

Forecasting Field Defect Rates Using a Combined Time-Based and Metrics-Based Approach: A Case Study of OpenBSD

Paul Luo Li, J. Herbsleb, M. Shaw
16th IEEE International Symposium on Software Reliability Engineering (ISSRE'05)  
In this paper, we present an empirical case study of ten releases of OpenBSD.  ...  We identify the SRGM that produces the most accurate forecasts and subjectively determine the preferred metrics-based prediction method and set of predictors.  ...  We would like to thank the developers of OpenBSD for their insight and tool vendors who gave us trial licenses.  ... 
doi:10.1109/issre.2005.19 dblp:conf/issre/LiHS05 fatcat:m3bnl5zgrzg65fzm7pihkac2dy

A survey and taxonomy of approaches for mining software repositories in the context of software evolution

Huzefa Kagdi, Michael L. Collard, Jonathan I. Maletic
2007 Journal of Software Maintenance and Evolution Research and Practice  
used (how), and the evaluation method (quality).  ...  A comprehensive literature survey on approaches for mining software repositories (MSR) in the context of software evolution is presented.  ...  The authors described their study on five NASA applications. Various data-mining tools LSR, M5, J48, and ROCKY were used to automatically generate defect detectors.  ... 
doi:10.1002/smr.344 fatcat:zri7uxf7aba6forbe77gkmw2ru

Which is the right source for vulnerability studies?

Fabio Massacci, Viet Hung Nguyen
2010 Proceedings of the 6th International Workshop on Security Measurements and Metrics - MetriSec '10  
Recent years have seen a trend towards the notion of quantitative security assessment and the use of empirical methods to analyze or predict vulnerable components.  ...  In our work, we focus on a more fundamental question: the quality of vulnerability database. We provide an analytical comparison of different security metric papers and the relative data sources.  ...  [29] build a logistic regression model to predict post-release defects of Eclipse using several metrics on different levels of code base i.e., methods, classes, files and packages.  ... 
doi:10.1145/1853919.1853925 fatcat:cul7kftv45dubjxpichpdxlrj4

Analysis of operating system diversity for intrusion tolerance

Miguel Garcia, Alysson Bessani, Ilir Gashi, Nuno Neves, Rafael Obelheiro
2013 Software, Practice & Experience  
Ilir Gashi has been supported by a Strategic Development Fund (SDF), and a Pump Priming Fund grant, both from City University London.  ...  This work was partially supported by the EC through project FP7-257475 (MASSIF) and by the FCT through the Multiannual and the CMU-Portugal Programmes, and the project PTDC/EIA-EIA/100894/2008 (DIVERSE  ...  This study was based on fault injection: combinations of valid and invalid parameters were supplied to often-used system calls 6 M.  ... 
doi:10.1002/spe.2180 fatcat:bvm5gvobjjhtxiflrwi5a5aktq

OS diversity for intrusion tolerance: Myth or reality?

Miguel Garcia, Alysson Bessani, Ilir Gashi, Nuno Neves, Rafael Obelheiro
2011 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN)  
One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct behavior in the presence of attacks and intrusions.  ...  We found this number to be low for several combinations of OSes.  ...  Ilir Gashi is supported by a Strategic Development Fund (SDF) grant from City University London.  ... 
doi:10.1109/dsn.2011.5958251 dblp:conf/dsn/GarciaBGNO11 fatcat:45irvz6mnfdojpowepktazdvhe

A Comprehensive Review of Cybersecurity in Inverter-based Smart Power System amid the Boom of Renewable Energy

Nguyen Duc Tuyen, Nguyen Sy Quan, Vo Ba Linh, Tuyen V. Vu, Goro Fujita
2022 IEEE Access  
This paper presents a comprehensive review of the system structure and vulnerabilities of typical inverter-based power system with distributed energy resources (DERs) integration, nature of several types  ...  Finally, challenges, unsolved problems, and future direction of the field are discussed and concluded at the end of the journal.  ...  the drafting of this study, also special thanks to Hoang Nhat for his help in designing and drawing beautiful figures for this journal and Le Ngoc Dung for his help in data analysis and classification  ... 
doi:10.1109/access.2022.3163551 fatcat:adylc72usbenzb6awm3pyqiyri

Network Organization and Governance [chapter]

2018 CRC Handbook of Modern Telecommunications  
OpenSSH was developed by the OpenBSD project and thus has a BSD license.  ...  This bottom-up approach to technology innovation and adaptation is a first, and is indicative of the rate of change in electronic technologies.  ...  Existing prepaid systems heavily rely on network-based charging, which can deal with time-based charging, but are incapable of charging the combination of voice, data, and content services.  ... 
doi:10.1201/9781420078084-9 fatcat:eyixyd27nzbmthwoqybadgqz2e

What Makes a Great Software Engineer?

Paul Luo Li, Andrew J. Ko, Jiamin Zhu
2015 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering  
However, today, we lack a holistic, contextual, and real-world understanding of software engineering expertise.  ...  on ratings.  ...  The approach of inductively deriving a set of attributes based on qualitative interviews and then conducting a qualitative survey based on the findings, is a good approach (we use the same in this thesis  ... 
doi:10.1109/icse.2015.335 dblp:conf/icse/LiKZ15 fatcat:kmncmxi2avhkjbdaclcvzciz2q

A descriptive process model for open-source software development [article]

Kim Johnson, University Of Calgary, University Of Calgary, Robert Kremer
2005
Abstract Open Source is a term used to describe a tradition of open standards, shared source code, and collaborative software development.  ...  My appreciation and respect to those who have pioneered open-source software development. It is a truly unique approach and a fascinating area for research.  ...  Defects per thousand deltas (KDelta) is used to handle the problem of bloated code (considered bad but with an artificially low defect rate). 4? earlier reduction of errors.  ... 
doi:10.11575/prism/22282 fatcat:7zgjsnwv2fdgtbsxn72ppsb5be

EMERGING Publicity Chairs EMERGING Publicity Chairs EMERGING 2015 Technical Program Committee

Pascal Lorenz, Carl Debono, Norihiko Yoshida, Jean-Michel Dricot, Anna Medve, Rolf Drechsler, Christian Blum, Ikerbasque -Basque, David Carrera, Henri Tudor, Crp, Henri Tudor (+117 others)
Advanced Informatics School   unpublished
We also hope that Nice, France, provided a pleasant environment during the conference and everyone saved some time to enjoy the charm of the city. EMERGING 2015 Chairs EMERGING Advisory Chairs  ...  We also kindly thank all the authors that dedicated much of their time and effort to contribute to EMERGING 2015.  ...  and deployment of the SmartCampus testbed.  ... 
fatcat:tdu3exqwnzdbhkceqpxpcxes4m