Sciweavers

286 search results - page 45 / 58
» Crypto Engineering: Some History and Some Case Studies
Sort
View
ICSE
1999
IEEE-ACM
13 years 12 months ago
Avoiding Packaging Mismatch with Flexible Packaging
To integrate a software component into a system, it must interact properly with the system's other components. Unfortunately,the decisions about how a component is to interac...
Robert DeLine
ICSE
1999
IEEE-ACM
13 years 12 months ago
Splitting the Organization and Integrating the Code: Conway's Law Revisited
It is widely acknowledged that coordination of large scale software development is an extremely difficult and persistent problem. Since the structure of the code mirrors the struc...
James D. Herbsleb, Rebecca E. Grinter
AMAST
2006
Springer
13 years 11 months ago
State Space Reduction of Rewrite Theories Using Invisible Transitions
Abstract. State space explosion is the hardest challenge to the effective application of model checking methods. We present a new technique for achieving drastic state space reduct...
Azadeh Farzan, José Meseguer
ICSM
1995
IEEE
13 years 11 months ago
Iterative reengineering to compensate for quick-fix maintenance
A typical approach to software maintenance is analyzing just the source code, applying some patches, releasing the new version, and then updating the documentation. This quick-fix...
Filippo Lanubile, Giuseppe Visaggio
ESEM
2009
ACM
13 years 11 months ago
Understanding the use of inheritance with visual patterns
The goal of this work is to visualize inheritance in objectoriented programs to help its comprehension. We propose a single, compact view of all class hierarchies at once using a ...
Simon Denier, Houari A. Sahraoui