Sciweavers

483 search results - page 13 / 97
» Experimental Software Engineering: A Report on the State of ...
Sort
View
IWPC
2009
IEEE
14 years 3 months ago
The effectiveness of source code obfuscation: An experimental assessment
Source code obfuscation is a protection mechanism widely used to limit the possibility of malicious reverse engineering or attack activities on a software system. Although several...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...
ICSE
2001
IEEE-ACM
14 years 1 months ago
State, Event, Time and Diagram in System Modeling
The design of complex systems requires powerful mechanisms for modeling state, concurrent events, and real-time behavior; as well as for visualising and structuring systems in ord...
Jin Song Dong
JSW
2007
102views more  JSW 2007»
13 years 8 months ago
Model-driven Engineering for Early QoS Validation of Component-based Software Systems
— Model-driven engineering (MDE) techniques are increasingly being used to address many of the development and operational lifecycle concerns of large-scale component-based syste...
James H. Hill, Aniruddha S. Gokhale
WWW
2007
ACM
14 years 9 months ago
Electoral search using the VerkiezingsKijker: an experience report
The Netherlands had parliamentary elections on November 22, 2006. We built a system which helped voters to make an informed choice among the many participating parties. One of the...
Valentin Jijkoun, Maarten Marx, Maarten de Rijke, ...
ICSE
2008
IEEE-ACM
14 years 9 months ago
Predicting accurate and actionable static analysis warnings: an experimental approach
Static analysis tools report software defects that may or may not be detected by other verification methods. Two challenges complicating the adoption of these tools are spurious f...
Joseph R. Ruthruff, John Penix, J. David Morgentha...