Sciweavers

2015 search results - page 84 / 403
» Hidden Software Capabilities
Sort
View
ICSE
2010
IEEE-ACM
14 years 2 months ago
Flexible architecture conformance assessment with ConQAT
The architecture of software systems is known to decay if no counter-measures are taken. In order to prevent this architectural erosion, the conformance of the actual system archi...
Florian Deissenboeck, Lars Heinemann, Benjamin Hum...
SEFM
2009
IEEE
14 years 3 months ago
A Computability Perspective on Self-Modifying Programs
Abstract—In order to increase their stealth, malware commonly use the self-modification property of programs. By doing so, programs can hide their real code so that it is diffi...
Guillaume Bonfante, Jean-Yves Marion, Daniel Reyna...
AGILEDC
2006
IEEE
14 years 3 months ago
The Role of Story Cards and the Wall in XP teams: A Distributed Cognition Perspective
Much of the knowledge used within an XP team is tacit, i.e. it is hidden and intangible. Two tangible artefacts that carry information about the team’s work are the index cards ...
Helen Sharp, Hugh Robinson, Judith Segal, Dominic ...
IWPC
2006
IEEE
14 years 3 months ago
How Developers Copy
Copy-paste programming is dangerous as it may lead to hidden dependencies between different parts of the system. Modifying clones is not always straight forward, because we might ...
Mihai Balint, Radu Marinescu, Tudor Gîrba
EUROMICRO
1998
IEEE
14 years 1 months ago
Design Correctness of Digital Systems
Transformational design is aformal technique directed at design correctness. It integrates design and veriJication by the use of pre-proven behaviour preserving transformations as...
Corrie Huijs