Sciweavers

2015 search results - page 75 / 403
» Hidden Software Capabilities
Sort
View
ESEM
2010
ACM
13 years 7 months ago
Exploring the use of crowdsourcing to support empirical studies in software engineering
The power and the generality of the findings obtained through empirical studies are bounded by the number and type of participating subjects. In software engineering, obtaining a ...
Kathryn T. Stolee, Sebastian G. Elbaum
GECCO
2010
Springer
189views Optimization» more  GECCO 2010»
13 years 6 months ago
Multiobjective evolutionary algorithm for software project portfolio optimization
Large software companies have to plan their project portfolio to maximize potential portfolio return and strategic alignment, while balancing various preferences, and considering ...
Thomas Kremmel, Jirí Kubalík, Stefan...
DSOM
2003
Springer
14 years 2 months ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung
ICSE
2007
IEEE-ACM
14 years 9 months ago
Tracking Code Clones in Evolving Software
Code clones are generally considered harmful in software development, and the predominant approach is to try to eliminate them through refactoring. However, recent research has pr...
Ekwa Duala-Ekoko, Martin P. Robillard
ISPW
2007
IEEE
14 years 3 months ago
Project Delay Variability Simulation in Software Product Line Development
The possible variability of project delay is useful information to understand and mitigate the project delay risk. However, it is not sufficiently considered in the literature con...
Makoto Nonaka, Liming Zhu, Muhammad Ali Babar, Mar...