Sciweavers

582 search results - page 116 / 117
» Model-driven Software Refactoring
Sort
View
HICSS
2005
IEEE
143views Biometrics» more  HICSS 2005»
14 years 2 months ago
Strategic Versus Tactical Design
Abstract. We seek to distinguish Strategic design decisions (e.g., to adopt a programming paradigm, architectural style, CBSE standard or application framework) from tactical desig...
Amnon H. Eden
OOPSLA
2004
Springer
14 years 1 months ago
Resolving feature convolution in middleware systems
Middleware provides simplicity and uniformity for the development of distributed applications. However, the modularity of the architecture of middleware is starting to disintegrat...
Charles Zhang, Hans-Arno Jacobsen
ACMSE
2006
ACM
13 years 10 months ago
Phoenix-based clone detection using suffix trees
A code clone represents a sequence of statements that are duplicated in multiple locations of a program. Clones often arise in source code as a result of multiple cut/paste operat...
Robert Tairas, Jeff Gray
PLDI
2009
ACM
14 years 9 months ago
Semantics-aware trace analysis
As computer systems continue to become more powerful and comdo programs. High-level abstractions introduced to deal with complexity in large programs, while simplifying human reas...
Kevin J. Hoffman, Patrick Eugster, Suresh Jagannat...
CCS
2008
ACM
13 years 10 months ago
Verifiable functional purity in java
Proving that particular methods within a code base are functionally pure--deterministic and side-effect free--would aid verification of security properties including function inve...
Matthew Finifter, Adrian Mettler, Naveen Sastry, D...