Security, privacy and governance are increasingly the focus of government regulations in the U.S., Europe and elsewhere. This trend has created a “regulation compliance” probl...
Nadzeya Kiyavitskaya, Nicola Zeni, Travis D. Breau...
Developers of distributed systems routinely construct discrete-event simulations to help understand and evaluate the behavior of inter-component protocols. Simulations are abstrac...
Matthew J. Rutherford, Antonio Carzaniga, Alexande...
Bidirectional transformation is a pair of transformations: a view function and a backward transformation. A view function maps one data structure called source onto another called...
Software developers often duplicate source code to replicate functionality. This practice can hinder the maintenance of a software project: bugs may arise when two identical code ...
Inspections can be made more cost-effective by using capturerecapture methods to estimate post-inspection defects. Previous capture-recapture studies of inspections used relativel...
Gursimran Singh Walia, Jeffrey C. Carver, Nachiapp...