Filters








386 Hits in 2.6 sec

High-MCC functions in the Linux kernel

Ahmad Jbara, Adam Matan, Dror G. Feitelson
2012 2012 20th IEEE International Conference on Program Comprehension (ICPC)  
However, the Linux kernel includes more than 800 functions with MCC values above 50, and over the years 369 functions have had an MCC of 100 or more.  ...  Moreover, some of these functions undergo extensive evolution, indicating that developers are successful in coping with the supposed high complexity.  ...  ANALYSIS OF HIGH MCC FUNCTIONS IN LINUX When studying the evolution of the Linux kernel, and in particular how various code metrics change with time, we found that some Linux kernel functions have MCC  ... 
doi:10.1109/icpc.2012.6240512 dblp:conf/iwpc/JbaraMF12 fatcat:62faswpnnzfzrelblyseocj2fi

High-MCC Functions in the Linux Kernel

Ahmad Jbara, Adam Matan, Dror G. Feitelson
2013 Empirical Software Engineering  
However, the Linux kernel includes more than 800 functions with MCC values above 50, and over the years 369 functions have had an MCC of 100 or more.  ...  Moreover, some of these functions undergo extensive evolution, indicating that developers are successful in coping with the supposed high complexity.  ...  ANALYSIS OF HIGH MCC FUNCTIONS IN LINUX When studying the evolution of the Linux kernel, and in particular how various code metrics change with time, we found that some Linux kernel functions have MCC  ... 
doi:10.1007/s10664-013-9275-7 fatcat:3h2vmcbbtbca7cehlzon37llze

The Linux kernel as a case study in software evolution

Ayelet Israeli, Dror G. Feitelson
2010 Journal of Systems and Software  
We use 810 versions of the Linux kernel, released over a period of 14 years, to characterize the system's evolution, using Lehman's laws of software evolution as a basis.  ...  For example, system growth has traditionally been quantified using lines of code or number of functions, but functional growth of an operating system like Linux can also be quantified using the number  ...  High-MCC Functions While the results for the low-MCC functions are encouraging, one should also consider the high-MCC functions in the tail of the distribution.  ... 
doi:10.1016/j.jss.2009.09.042 fatcat:wicuoyslinesjpdsy6tgwtjb7e

Vulnerability Prediction Models: A Case Study on the Linux Kernel

Matthieu Jimenez, Mike Papadakis, Yves Le Traon
2016 2016 IEEE 16th International Working Conference on Source Code Analysis and Manipulation (SCAM)  
., their ability to distinguish between vulnerable and non-vulnerable components, in the context of the Linux Kernel, under different scenarios.  ...  We show that in the context of the Linux kernel, vulnerability prediction models can be superior to random selection and relatively precise.  ...  This paper lies in the context of the Linux kernel.  ... 
doi:10.1109/scam.2016.15 dblp:conf/scam/JimenezPT16 fatcat:w4sgsgoccvaybdzvnoouor25ea

Reducing TCB complexity for security-sensitive applications

Lenin Singaravelu, Calton Pu, Hermann Härtig, Christian Helmuth
2006 Proceedings of the 2006 EuroSys conference on - EuroSys '06  
ABSTRACT The large size and high complexity of securitysensitive applications and systems software is a primary cause for their poor testability and high vulnerability.  ...  At the system software level, we use the Nizza architecture which relies on a kernelized trusted computing base (TCB) and on the reuse of legacy code using trusted wrappers to minimize the size of the  ...  The authors from TU Dresden were supported by grants from BMWi, DFG, and Intel.  ... 
doi:10.1145/1217935.1217951 dblp:conf/eurosys/SingaraveluPHH06 fatcat:x75loqv3e5fbvam6hyyxhxhpyq

Reducing TCB complexity for security-sensitive applications

Lenin Singaravelu, Calton Pu, Hermann Härtig, Christian Helmuth
2006 ACM SIGOPS Operating Systems Review  
ABSTRACT The large size and high complexity of securitysensitive applications and systems software is a primary cause for their poor testability and high vulnerability.  ...  At the system software level, we use the Nizza architecture which relies on a kernelized trusted computing base (TCB) and on the reuse of legacy code using trusted wrappers to minimize the size of the  ...  The authors from TU Dresden were supported by grants from BMWi, DFG, and Intel.  ... 
doi:10.1145/1218063.1217951 fatcat:tu4tdaa255ghtjwh5fb3xqizsq

The high-energy physicist's guide to MathLink

T. Hahn
2012 Computer Physics Communications  
MathLink is Wolfram Research's protocol for communicating with the Mathematica Kernel and is used extensively in their own Notebook Frontends.  ...  The Mathematica Book insinuates that linking C programs with MathLink is straightforward but in practice there are quite a number of stumbling blocks, in particular in cross-language and cross-platform  ...  In the sense in which the colloquial 'Linux' is more correctly GNU/Linux (GNU utilities, Linux kernel), Cygwin might be termed GNU/Windows.  ... 
doi:10.1016/j.cpc.2011.10.018 fatcat:3vfd6e7mbnexpolaryfgiha27q

The importance of accounting for real-world labelling when predicting software vulnerabilities

Matthieu Jimenez, Renaud Rwemalika, Mike Papadakis, Federica Sarro, Yves Le Traon, Mark Harman
2019 Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering - ESEC/FSE 2019  
More precisely, MCC mean values of predictive effectiveness drop from 0.77, 0.65 and 0.43 to 0.08, 0.22, 0.10 for Linux Kernel, OpenSSL and Wiresark, respectively.  ...  In this paper we present results from a comprehensive empirical study of 1,898 real-world vulnerabilities reported in 74 releases of three security-critical open source systems (Linux Kernel, OpenSSL and  ...  We can observe little differences between the approaches, in terms of the MCC values, only Code Metrics performs slightly better (measured by MCC) than the other three methods for Linux Kernel.  ... 
doi:10.1145/3338906.3338941 dblp:conf/sigsoft/JimenezRPSTH19 fatcat:iqcbsp36a5fv3pgi73exx46idi

Micro Congestion Control: Every Flow Deserves a Second Chance [article]

Kefan Chen, Danfeng Shan, Xiaohui Luo, Tong Zhang, Yajun Yang, Ya Zhao, Fengyuan Ren
2018 arXiv   pre-print
We design and implement MCC in Linux, and the experiments validate that MCC is capable of smoothly switching among various candidate algorithms on the fly to achieve potential performance gain in the real  ...  With MCC, diverse algorithms can be assigned purposely to connections in one server to adapt to heterogeneity, and different algorithms can be chosen in each connection's life cycle to keep pace with the  ...  Dozens of congestion control algorithms are implemented in Linux kernel in the form of loadable modules.  ... 
arXiv:1806.05406v2 fatcat:p6yapwzozjafhjd7czzh342cz4

On the effect of code regularity on comprehension

Ahmad Jbara, Dror G. Feitelson
2014 Proceedings of the 22nd International Conference on Program Comprehension - ICPC 2014  
We demonstrate this by controlled experiments where subjects perform cognitive tasks on different versions of the same basic function.  ...  These results indicate that regularity is another attribute of code that should be taken into account in the context of studying the code's complexity and comprehension.  ...  Figure 1 : 1 Code structure diagram (CSD) of a regular function from the Linux kernel.  ... 
doi:10.1145/2597008.2597140 dblp:conf/iwpc/JbaraF14 fatcat:skeq3jouc5cqzehbeklefvk57m

A Machine Learning Approach for Prediction of Gibberellic Acid Metabolic Enzymes in Monocotyledonous Plants

P Sreepriya, S Naganeeswaran, N Hemalatha, P Sreejisha, MK Rajesh
2014 Transactions on Machine Learning and Artificial Intelligence  
'GAPred' is a web-based system to provide a comprehensive collection of enzymes in GA metabolic pathway and a systematic framework for the analysis of these enzymes for monocots.  ...  We have designed and implemented a high performance prediction tool for these enzymes using machine learning algorithms.  ...  In SVMs, the kernel function selected must be the most favorable one. Here in the creation of SVM models, we have used three types of kernel functions: linear, polynomial, and radial.  ... 
doi:10.14738/tmlai.24.375 fatcat:6dmshgqbpba4xhksjccnjjv77q

Kernel based machine learning algorithm for the efficient prediction of type III polyketide synthase family of proteins

V Mallika, K C Sivakumar, S Jaichand, E V Soniya
2010 Journal of Integrative Bioinformatics  
In this approach, we have designed and implemented PKSIIIpred, a high performance prediction server for type III PKS where the classifier is Support Vector Machines (SVMs).  ...  Based on the limited training dataset, the tool efficiently predicts the type III PKS superfamily of proteins with high sensitivity and specificity.  ...  Acknowledgements The authors wish to thank BTISNet, Department of Biotechnology, Government of India for the Bioinformatics facility.  ... 
doi:10.2390/biecoll-jib-2010-143 pmid:20625199 fatcat:up5psn3vzbd4zm4ovbq25hwnqy

Kernel based machine learning algorithm for the efficient prediction of type III polyketide synthase family of proteins

V Mallika, Kc Sivakumar, S Jaichand, Ev Soniya
2010 Journal of Integrative Bioinformatics  
In this approach, we have designed and implemented PKSIIIpred, a high performance prediction server for type III PKS where the classifier is Support Vector Machine (SVM).  ...  Based on the limited training dataset, the tool efficiently predicts the type III PKS superfamily of proteins with high sensitivity and specificity.  ...  Acknowledgements The authors wish to thank BTISNet, Department of Biotechnology, Government of India for the Bioinformatics facility.  ... 
doi:10.1515/jib-2010-143 fatcat:jgdzklwq5jg7fasvjuknv44xle

JCSD: visual support for understanding code control structure

Ahmad Jbara, Dror G. Feitelson
2014 Proceedings of the 22nd International Conference on Program Comprehension - ICPC 2014  
Such functions are burdened with very many programming constructs as lines of code (LOC) strongly correlate with the McCabe's cyclomatic complexity (MCC).  ...  Program comprehension is a vital mental process in any maintenance activity. It becomes decisive as functions get larger.  ...  Acknowledgments Thanks to Elinor Alpay, Daniel Shragai, and Chen Shabo from the Computer Science Department of the Netanya Academic College for their active involvement in the implementation phase of this  ... 
doi:10.1145/2597008.2597801 dblp:conf/iwpc/JbaraF14a fatcat:n5deth2acbapxmcacfszfpf5im

A comparison of Linux CAN drivers and their applications

Michal Sojka, Pavel Pisa, Martin Petera, Ondrej Spinka, Zdenek Hanzalek
2010 International Symposium on Industrial Embedded System (SIES)  
The aim of this paper is to introduce LinCAN, a CAN driver system for Linux, developed at the Department of Control Engineering of the Czech Technical University in Prague, and to provide a thorough comparison  ...  A timing analysis and performance tests of both drivers were performed using various types of load with several recent Linux kernels.  ...  ACKNOWLEDGMENTS This work was supported by the Ministry of Education of the Czech Republic under projects 1M0567 and ME10039.  ... 
doi:10.1109/sies.2010.5551367 dblp:conf/sies/SojkaPPSH10 fatcat:yqewspie6bgajluvuokwr2wwma
« Previous Showing results 1 — 15 out of 386 results