Sciweavers

2030 search results - page 235 / 406
» Checklists for Software Engineering Case Study Research
Sort
View
FOSSACS
2008
Springer
13 years 9 months ago
Compositional Methods for Information-Hiding
Protocols for information-hiding often use randomized primitives to obfuscate the link between the observables and the information to be protected. The degree of protection provide...
Christelle Braun, Konstantinos Chatzikokolakis, Ca...
ICESS
2007
Springer
14 years 2 months ago
Situation-Aware Based Self-adaptive Architecture for Mission Critical Systems
Conventional mission-critical systems cannot prevent mission failure in dynamic battlefield environments in which the execution situations or missions change abruptly. To solve th...
Sangsoo Kim, Jiyong Park, Heeseo Chae, Hoh Peter I...
WCRE
2006
IEEE
14 years 2 months ago
"Cloning Considered Harmful" Considered Harmful
Current literature on the topic of duplicated (cloned) code in software systems often considers duplication harmful to the system quality and the reasons commonly cited for duplic...
Cory Kapser, Michael W. Godfrey
WCRE
2006
IEEE
14 years 2 months ago
Mining Control Flow Graphs for Crosscutting Concerns
Aspect mining tries to identify crosscutting concerns in existing systems and thus supports the adaption to an aspect-oriented design. This paper describes an automatic static asp...
Jens Krinke
CSMR
2008
IEEE
14 years 2 months ago
Trend Analysis and Issue Prediction in Large-Scale Open Source Systems
Effort to evolve and maintain a software system is likely to vary depending on the amount and frequency of change requests. This paper proposes to model change requests as time se...
Bénédicte Kenmei, Giuliano Antoniol,...