Sciweavers

582 search results - page 105 / 117
» Model-driven Software Refactoring
Sort
View
ICSE
2007
IEEE-ACM
14 years 8 months ago
Testing and Analysis of Access Control Policies
Policy testing and analysis are important techniques for high assurance of correct specification of access control policies. We propose a set of testing and analysis techniques fo...
Evan Martin
FASE
2009
Springer
14 years 3 months ago
Reducing the Costs of Bounded-Exhaustive Testing
Abstract. Bounded-exhaustive testing is an automated testing methodology that checks the code under test for all inputs within given bounds: first the user describes a set of test...
Vilas Jagannath, Yun Young Lee, Brett Daniel, Dark...
ICSE
2009
IEEE-ACM
14 years 3 months ago
Improving quality, one process change at a time
We report on one organization's experience making process changes in a suite of projects. The changes were motivated by clients’ requests for better time estimates, better ...
Caryna Pinheiro, Frank Maurer, Jonathan Sillito
KBSE
2008
IEEE
14 years 2 months ago
Automated Aspect Recommendation through Clustering-Based Fan-in Analysis
Identifying code implementing a crosscutting concern (CCC) automatically can benefit the maintainability and evolvability of the application. Although many approaches have been p...
Danfeng Zhang, Yao Guo, Xiangqun Chen
AOSD
2006
ACM
14 years 2 months ago
A join point for loops in AspectJ
The current AspectJ join points represent locations in the code that are at the interface of the Java objects. However, not all the “things that happen”1 happen at the interfa...
Bruno Harbulot, John R. Gurd