Sciweavers

439 search results - page 20 / 88
» Identification of Software Instabilities
Sort
View
CSMR
2009
IEEE
14 years 2 months ago
Identification of Extract Method Refactoring Opportunities
Extract Method has been recognized as one of the most important refactorings, since it decomposes large methods and can be used in combination with other refactorings for fixing a...
Nikolaos Tsantalis, Alexander Chatzigeorgiou
ICSM
1998
IEEE
14 years 5 hour ago
Identification of Data Cohesive Subsystems Using Data Mining Techniques
The activity of reengineering and maintaining large legacy systems involves the use of design recovery es to produce abstractions that facilitate the understanding of the system. ...
Carlos Montes de Oca, Doris L. Carver
AVI
2004
13 years 9 months ago
Identification and validation of cognitive design principles for automated generation of assembly instructions
Designing effective instructions for everyday products is challenging. One reason is that designers lack a set of design principles for producing visually comprehensible and acces...
Julie Heiser, Doantam Phan, Maneesh Agrawala, Barb...
ICST
2009
IEEE
13 years 5 months ago
Penetration Testing with Improved Input Vector Identification
Penetration testing is widely used to help ensure the security of web applications. It discovers vulnerabilities by simulating attacks from malicious users on a target application...
William G. J. Halfond, Shauvik Roy Choudhary, Ales...
ICST
2010
IEEE
13 years 6 months ago
Searching for a Needle in a Haystack: Predicting Security Vulnerabilities for Windows Vista
—Many factors are believed to increase the vulnerability of software system; for example, the more widely deployed or popular is a software system the more likely it is to be att...
Thomas Zimmermann, Nachiappan Nagappan, Laurie A. ...