Abstract. When a vulnerability is discovered in a cryptographic algorithm, or in a specific implementation of that algorithm, it is important that software using that algorithm or...
Transgenetic algorithms are evolutionary computing techniques based on living processes where cooperation is the main evolutionary strategy. Those processes contain the movement o...
Elizabeth Ferreira Gouvea Goldbarg, Marco Cé...
Agent-based participatory simulations are laboratory experiments designed like agent-based simulations and where humans access the simulation as software agents. This paper descri...
—At ICSE 2010, the Code Bubbles team from Brown University and the Code Canvas team from Microsoft Research presented similar ideas for new user experiences for an integrated dev...
Robert DeLine, Andrew Bragdon, Kael Rowan, Jens Ja...
With special focus on software architectural issues, we report from the first two major phases of a software development project. Our experience suggests that explicit focus on so...
Michael Christensen, Christian Heide Damm, Klaus M...