Sciweavers

439 search results - page 10 / 88
» Identification of Software Instabilities
Sort
View
ESE
2008
112views Database» more  ESE 2008»
13 years 7 months ago
"Cloning considered harmful" considered harmful: patterns of cloning in software
Literature on the topic of code cloning often asserts that duplicating code within a software system is a bad practice, that it causes harm to the system's design and should b...
Cory Kapser, Michael W. Godfrey
HASE
2002
IEEE
14 years 20 days ago
The Concept and Practice of Software Quality Assurance in Japan in the Global Era
The Japanese computer industry in 1990s was hit with two major shocks at the same time. One shock was the drastic reform of computers and of network. The other shock was from the ...
Katsuyuki Yasuda, Shigeru Yamada
SEKE
2005
Springer
14 years 1 months ago
Service Identification and Packaging in Service Oriented Reengineering
With the adoption to Web service technologies, more and more existing non-service-oriented software systems turn to be legacy systems. They require a service-oriented reengineerin...
Zhuopeng Zhang, Ruimin Liu, Hongji Yang
ASIACRYPT
2001
Springer
13 years 11 months ago
Secure Human Identification Protocols
One interesting and important challenge for the cryptologic community is that of providing secure authentication and identification for unassisted humans. There are a range of prot...
Nicholas J. Hopper, Manuel Blum
KBSE
1997
IEEE
13 years 12 months ago
Applying Concept Formation Methods to Object Identification in Procedural Code
Legacy software systems present a high level of entropy combined with imprecise documentation. This makes their maintenance more difficult, more time consuming, and costlier. In o...
Houari A. Sahraoui, Walcélio L. Melo, Hakim...