Sciweavers

377 search results - page 59 / 76
» A Case Study based Software Engineering Education using Open...
Sort
View
PASTE
2010
ACM
15 years 7 months ago
Extracting compiler provenance from program binaries
We present a novel technique that identifies the source compiler of program binaries, an important element of program provenance. Program provenance answers fundamental questions...
Nathan E. Rosenblum, Barton P. Miller, Xiaojin Zhu
119
Voted
ICHIT
2009
Springer
15 years 11 days ago
Design and implementation of a live-analysis digital forensic system
As the popularity of the internet continues growing, not only change our life, but also change the way of crime. Number of crime by computer as tools, place or target, cases of su...
Pei-Hua Yen, Chung-Huang Yang, Tae-Nam Ahn
117
Voted
ICSM
2009
IEEE
15 years 9 months ago
Managing code clones using dynamic change tracking and resolution
Code cloning is widely recognized as a threat to the maintainability of source code. As such, many clone detection and removal strategies have been proposed. However, some clones ...
Michiel de Wit, Andy Zaidman, Arie van Deursen
117
Voted
GECCO
2006
Springer
253views Optimization» more  GECCO 2006»
15 years 6 months ago
A novel approach to optimize clone refactoring activity
Achieving a high quality and cost-effective tests is a major concern for software buyers and sellers. Using tools and integrating techniques to carry out low cost testing are chal...
Salah Bouktif, Giuliano Antoniol, Ettore Merlo, Ma...
112
Voted
CSEE
2000
Springer
15 years 7 months ago
Technology Transfer Issues for Formal Methods of Software Specification
Accurate and complete requirements specifications are crucial for the design and implementation of high-quality software. Unfortunately, the articulation and verification of softw...
Ken Abernethy, John C. Kelly, Ann E. Kelley Sobel,...