Sciweavers

166 search results - page 22 / 34
» Identifying State Transitions and their Functions in Source ...
Sort
View
ACMSE
2004
ACM
13 years 11 months ago
Methods for the prevention, detection and removal of software security vulnerabilities
Over the past decade, the need to build secure software has become a dominant goal in software development. Consequently, software researchers and practitioners have identified wa...
Jay-Evan J. Tevis, John A. Hamilton Jr.
KBSE
2007
IEEE
14 years 1 months ago
Feature interaction analysis: a maintenance perspective
Software systems have become more complex, with myriad features and multiple functionalities. A major challenge in developing and maintaining such complex software is to identify ...
Maryam Shiri, Jameleddine Hassine, Juergen Rilling
IWPC
2000
IEEE
13 years 12 months ago
Evaluating the Accessor Classification Approach to Detect Abstract Data Types
ng the Accessor Classification Approach to Detect Abstract Data Types icle presents an approach to identify abstract data types (ADTs) in source code. For each structured type deï...
Jean-Francois Girard, Martin Würthner
MBEES
2008
13 years 9 months ago
Composition of Model-based Test Coverage Criteria
: In this paper, we discuss adjustable coverage criteria and their combinations in model-based testing. We formalize coverage criteria and specify test goals using OCL. Then, we pr...
Mario Friske, Bernd-Holger Schlingloff, Stephan We...
PPPJ
2006
ACM
14 years 1 months ago
Enabling Java mobile computing on the IBM Jikes research virtual machine
Today’s complex applications must face the distribution of data and code among different network nodes. Java is a wide-spread language that allows developers to build complex so...
Giacomo Cabri, Letizia Leonardi, Raffaele Quitadam...