Sciweavers

682 search results - page 85 / 137
» Java Implementation Verification Using Reverse Engineering
Sort
View
SIGSOFT
2007
ACM
16 years 2 months ago
Efficient token based clone detection with flexible tokenization
Code clones are similar code fragments that occur at multiple locations in a software system. Detection of code clones provides useful information for maintenance, reengineering, ...
Hamid Abdul Basit, Stan Jarzabek
CISIS
2010
IEEE
15 years 7 months ago
Shared Data Grid Programming Improvements Using Specialized Objects
- The shared data programming model is an attractive grid programming alternative to message passing solutions. This paper addresses type related improvements to a shared data grid...
Dacian Tudor, Georgiana Macariu, Wolfgang Schreine...
100
Voted
QSIC
2007
IEEE
15 years 8 months ago
Coping with API Evolution for Running, Mission-Critical Applications Using Virtual Execution Environment
Recent research showed that the majority of compatibility-breaking changes in a component-based, object-oriented software system are refactorings [5]. The software updating proces...
Bashar Gharaibeh, Tien N. Nguyen, J. Morris Chang
KBSE
2002
IEEE
15 years 7 months ago
On CASE Tool Usage at Nokia
We present the results of a research work targeted to understanding CASE tools usage in Nokia. By means of a survey questionnaire, we collected data aimed to identify what feature...
Alessandro Maccari, Claudio Riva, Francesco Maccar...
WWW
2007
ACM
16 years 2 months ago
Compiling cryptographic protocols for deployment on the web
Cryptographic protocols are useful for trust engineering in Web transactions. The Cryptographic Protocol Programming Language (CPPL) provides a model wherein trust management anno...
Jay A. McCarthy, Shriram Krishnamurthi, Joshua D. ...