Sciweavers

561 search results - page 40 / 113
» Exploiting Open-source Projects to Study Software Design
Sort
View
WCRE
2008
IEEE
14 years 2 months ago
Detecting Clones in Business Applications
A business application automates a collection of business processes. A business process describes how a set of logically related tasks are executed, ordered and managed by followi...
Jin Guo, Ying Zou
ELPUB
2007
ACM
13 years 11 months ago
Challenges in the Selection, Design and Implementation of an Online Submission and Peer Review System for STM Journals
Two international scientific publishers collaborated to develop an Online Submission and Peer Review System (OSPREY) for their journals. Our goals were to meet market demand, incr...
Judy Best, Richard Akerman
ICSE
2009
IEEE-ACM
14 years 2 months ago
Can peer code reviews be exploited for later information needs?
Code reviews have proven to be an effective means of improving overall software quality. During the review, there is an exchange of knowledge between the code author and reviewer ...
Andrew Sutherland, Gina Venolia
ERCIMDL
2009
Springer
193views Education» more  ERCIMDL 2009»
13 years 11 months ago
The Planets Interoperability Framework
We report on the implementation of a software infrastructure for preservation actions, carried out in the context of the European Integrated Project Planets – the Planets Interop...
Ross King, Rainer Schmidt, Andrew N. Jackson, Carl...
IJACTAICIT
2010
123views more  IJACTAICIT 2010»
13 years 5 months ago
A Hybrid Fault-Proneness Detection Approach Using Text Filtering and Static Code Analysis
We have proposed a fault-prone software module detection method using text-filtering approach, called Fault-proneness filtering. Even though the fault-proneness filtering achieved...
Osamu Mizuno, Hideaki Hata