Sciweavers

682 search results - page 85 / 137
» Java Implementation Verification Using Reverse Engineering
Sort
View
SIGSOFT
2007
ACM
14 years 8 months ago
Efficient token based clone detection with flexible tokenization
Code clones are similar code fragments that occur at multiple locations in a software system. Detection of code clones provides useful information for maintenance, reengineering, ...
Hamid Abdul Basit, Stan Jarzabek
CISIS
2010
IEEE
14 years 26 days ago
Shared Data Grid Programming Improvements Using Specialized Objects
- The shared data programming model is an attractive grid programming alternative to message passing solutions. This paper addresses type related improvements to a shared data grid...
Dacian Tudor, Georgiana Macariu, Wolfgang Schreine...
QSIC
2007
IEEE
14 years 2 months ago
Coping with API Evolution for Running, Mission-Critical Applications Using Virtual Execution Environment
Recent research showed that the majority of compatibility-breaking changes in a component-based, object-oriented software system are refactorings [5]. The software updating proces...
Bashar Gharaibeh, Tien N. Nguyen, J. Morris Chang
KBSE
2002
IEEE
14 years 20 days ago
On CASE Tool Usage at Nokia
We present the results of a research work targeted to understanding CASE tools usage in Nokia. By means of a survey questionnaire, we collected data aimed to identify what feature...
Alessandro Maccari, Claudio Riva, Francesco Maccar...
WWW
2007
ACM
14 years 8 months ago
Compiling cryptographic protocols for deployment on the web
Cryptographic protocols are useful for trust engineering in Web transactions. The Cryptographic Protocol Programming Language (CPPL) provides a model wherein trust management anno...
Jay A. McCarthy, Shriram Krishnamurthi, Joshua D. ...