Sciweavers

1994 search results - page 116 / 399
» Limited Software Warranties
Sort
View
ITNG
2008
IEEE
14 years 4 months ago
Towards a Specification Prototype for Hierarchy-Driven Attack Patterns
We propose the characteristics of a software tool that leverages specifying attack pattern details in understandable hierarchies. These hierarchies are currently manually populate...
Joshua J. Pauli, Patrick Henry Engebretson
IWPC
2008
IEEE
14 years 4 months ago
Reusing Program Investigation Knowledge for Code Understanding
Software maintenance tasks typically involve an important amount of program investigation effort on the part of software developers. To what extent can we benefit from prior prog...
Martin P. Robillard, Putra Manggala
KBSE
2008
IEEE
14 years 4 months ago
Cleman: Comprehensive Clone Group Evolution Management
—Recent research results have shown more benefits of the management of code clones, rather than detecting and removing them. However, existing management approaches for code clo...
Tung Thanh Nguyen, Hoan Anh Nguyen, Nam H. Pham, J...
ADAEUROPE
2008
Springer
14 years 4 months ago
An Ada 2005 Technology for Distributed and Real-Time Component-Based Applications
: The concept of interface in Ada 2005 significantly facilitates its usage as the basis for a software components technology. This technology, taking benefit of the resources that ...
Patricia López Martínez, José...
KBSE
2007
IEEE
14 years 4 months ago
Extraction of bug localization benchmarks from history
Researchers have proposed a number of tools for automatic bug localization. Given a program and a description of the failure, such tools pinpoint a set of statements that are most...
Valentin Dallmeier, Thomas Zimmermann