Sciweavers

114 search results - page 5 / 23
» Automatic identification of key classes in a software system...
Sort
View
CSMR
2009
IEEE
14 years 3 months ago
Identification of Extract Method Refactoring Opportunities
Extract Method has been recognized as one of the most important refactorings, since it decomposes large methods and can be used in combination with other refactorings for fixing a...
Nikolaos Tsantalis, Alexander Chatzigeorgiou
INFSOF
2007
104views more  INFSOF 2007»
13 years 8 months ago
A state-based approach to integration testing based on UML models
: Correct functioning of object-oriented software depends upon the successful integration of classes. While individual classes may function correctly, several new faults can arise ...
Shaukat Ali, Lionel C. Briand, Muhammad Jaffar-Ur ...
SOFTVIS
2010
ACM
13 years 8 months ago
User evaluation of polymetric views using a large visualization wall
There are few visualization techniques for displaying complex software systems with large numbers of packages and classes. One visualization technique is the System Hotspots View,...
Craig Anslow, Stuart Marshall, James Noble, Ewan D...
AFRICACRYPT
2009
Springer
14 years 3 months ago
Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed
We present the first simple power analysis (SPA) of software implementations of KeeLoq. Our attack drastically reduces the efforts required for a complete break of remote keyless...
Markus Kasper, Timo Kasper, Amir Moradi, Christof ...
AVSS
2003
IEEE
14 years 1 months ago
Automatic Face Region Tracking for Highly Accurate Face Recognition in Unconstrained Environments
In this paper, we present a combined real-time face region tracking and highly accurate face recognition technique for an intelligent surveillance system. Highresolution face imag...
Young-Ouk Kim, Joon Ki Paik, Jingu Heo, Andreas Ko...