Jeffery Voas

Learn More
We have investigated an assessment technique for studying the failure tolerance of large scale component based information systems Our technique assesses the propagation of information through the interfaces between objects in order to predict how software will behave when cor rupt information gets passed Our approach is applicable to both source code and(More)
We have investigated an assessment technique for studying the failure tolerance of large scale component based information systems Our tech nique assesses the tolerance of the interfaces between component objects in order to predict how the software will behave if anomalous failures exit certain components and enter others Note that we are not talking about(More)
The advent of smaller, faster, and always connected handheld devices along with the ever-increasing reliance on technology for our everyday activities have introduced novel threats and risks. Beyond hardware security another primary factor that affects the reliability of the device is mobile applications. Indeed, the shift to smart commercially available(More)
data types have little impact on software error masking as far as we can determine Inheritance is not necessarily detrimental to error masking however when combined with information hiding it may become lethal Unit testing costs increase as the depth of inheritance increases This is directly related to the increase in the number of drivers and stubs As a(More)
In public discourse, big data is often discussed in terms of "meta data." In Internet of Things (IoT), there is a similar concept: meta-ilities, and in particular, (1) Scalability, and (2) Heterogeneity. These 2 meta-ilities are unique due to complexity and diversity, and exemplify why IoT is different than past efforts with distributed systems,(More)
  • 1