Sciweavers

1767 search results - page 154 / 354
» Open Source Ecology
Sort
View
JSS
2007
169views more  JSS 2007»
13 years 8 months ago
MDABench: Customized benchmark generation using MDA
This paper describes an approach for generating customized benchmark suites from a software architecture description following a Model Driven Architecture (MDA) approach. The benc...
Liming Zhu, Ngoc Bao Bui, Yan Liu, Ian Gorton
GROUP
2010
ACM
13 years 6 months ago
Why it works (when it works): success factors in online creative collaboration
Online creative collaboration (peer production) has enabled the creation of Wikipedia and open source software (OSS), and is rapidly expanding to encompass new domains, such as vi...
Kurt Luther, Kelly E. Caine, Kevin Ziegler, Amy Br...
ICDE
2011
IEEE
233views Database» more  ICDE 2011»
12 years 11 months ago
Schema evolution analysis for embedded databases
—Dynamic software updating research efforts have mostly been focused on updating application code and in-memory state. As more and more applications use embedded databases for st...
Shengfeng Wu, Iulian Neamtiu
CCS
2011
ACM
12 years 8 months ago
WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction
Parameter tampering attacks are dangerous to a web application whose server fails to replicate the validation of user-supplied data that is performed by the client. Malicious user...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...
ECOOP
2011
Springer
12 years 8 months ago
An Empirical Study of Object Protocols in the Wild
Abstract. An active area of research in computer science is the prevention of violations of object protocols, i.e., restrictions on temporal orderings of method calls on an object....
Nels E. Beckman, Duri Kim, Jonathan Aldrich