An approach is presented that automatically determines if a given source code change impacts the design (i.e., UML class diagram) of the system. This allows code-to-design traceab...
Maen Hammad, Michael L. Collard, Jonathan I. Malet...
With the menace of hackers increasing every day, even well administrated networks are vulnerable to attack. Therefore, securing network assets has become a significant issue for th...
Several reengineering environments have been created to provide for a unified infrastructure in which various approaches can be employed together. While the collaboration between...
Mihai Balint, Petru Florin Mihancea, Tudor Gî...
Even though a thorough system specification improves the quality of the design , it is not sufficient to guarantee that a system will satisfy its reliability targets. Within this ...
Empirical work with "Belvedere," a software environment for the construction of diagrammatic representations of evidential relations, is summarized, leading to the hypot...