Sciweavers

439 search results - page 47 / 88
» Identification of Software Instabilities
Sort
View
126
Voted
ARCS
2006
Springer
15 years 6 months ago
Prototypical Implementation of Location-Aware Services Based on Super-Distributed RFID Tags
Abstract. We provide evidence of the feasibility and effectiveness of a middleware architecture for mobile devices which employs dense distributions of small computerized entities ...
Jürgen Bohn
125
Voted
AVI
2000
15 years 4 months ago
A Modular Approach for Exploring the Semantic Structure of Technical Document Collections
The identification and analysis of an enterprise's knowledge available in a documented form is a key element of knowledge management. Visual methods which allow easy access t...
Andreas Becks, Stefan Sklorz, Matthias Jarke
120
Voted
ICSE
2003
IEEE-ACM
16 years 2 months ago
Architectural Level Risk Assessment Tool Based on UML Specifications
Recent evidences indicate that most faults in software systems are found in only a few of a system's components [1]. The early identification of these components allows an or...
T. Wang, Ahmed E. Hassan, Ajith Guedem, Walid Abde...
137
Voted
ESEM
2009
ACM
15 years 9 months ago
The evolution and impact of code smells: A case study of two open source systems
Code smells are design flaws in object-oriented designs that may lead to maintainability issues in the further evolution of the software system. This study focuses on the evolutio...
Steffen Olbrich, Daniela Cruzes, Victor R. Basili,...
122
Voted
IRI
2006
IEEE
15 years 8 months ago
Applying the layered decision model to the design of language-based security systems
Safeguarding practices for networked systems involves decisions in at least three areas: identification of welldefined security policies, selection of cost-effective defense strat...
Huaqiang Wei, Jim Alves-Foss