Sciweavers

766 search results - page 60 / 154
» Detecting modifications in paper documents: a coding approac...
Sort
View
DOCENG
2004
ACM
14 years 2 months ago
Page composition using PPML as a link-editing script
The advantages of a COG (Component Object Graphic) approach to the composition of PDF pages have been set out in a previous paper [1]. However, if pages are to be composed in this...
Steven R. Bagley, David F. Brailsford
ECBS
2004
IEEE
129views Hardware» more  ECBS 2004»
14 years 24 days ago
Using Feature Modeling for Program Comprehension and Software Architecture Recovery
: The available evidence in a legacy software system, which can help in its understanding and recovery of its architecture are not always sufficient. Very often the system's d...
Ilian Pashov, Matthias Riebisch
SIGSOFT
2007
ACM
14 years 9 months ago
Training on errors experiment to detect fault-prone software modules by spam filter
The fault-prone module detection in source code is of importance for assurance of software quality. Most of previous fault-prone detection approaches are based on software metrics...
Osamu Mizuno, Tohru Kikuno
ICSM
2006
IEEE
14 years 3 months ago
On the Use of Line Co-change for Identifying Crosscutting Concern Code
Crosscutting concerns are software system features whose implementation is spread across many modules as tangled and scattered code. Identifying such code helps developers to chan...
Gerardo Canfora, Luigi Cerulo, Massimiliano Di Pen...
ICST
2008
IEEE
14 years 3 months ago
Test-Driven Assessment of Access Control in Legacy Applications
If access control policy decision points are not neatly separated from the business logic of a system, the evolution of a security policy likely leads to the necessity of changing...
Yves Le Traon, Tejeddine Mouelhi, Alexander Pretsc...