Sciweavers

239 search results - page 40 / 48
» Patterns of co-evolution between requirements and source cod...
Sort
View
EUROMICRO
2003
IEEE
14 years 27 days ago
Merging components and testing tools: The Self-Testing COTS Components (STECC) Strategy
Development of a software system from existing components can surely have various benefits, but can also entail a series of problems. One type of problems is caused by a limited ...
Sami Beydeda, Volker Gruhn
WWW
2007
ACM
14 years 8 months ago
Subspace: secure cross-domain communication for web mashups
Combining data and code from third-party sources has enabled a new wave of web mashups that add creativity and functionality to web applications. However, browsers are poorly desi...
Collin Jackson, Helen J. Wang
ICST
2009
IEEE
14 years 2 months ago
Inferring Types of References to GUI Objects in Test Scripts
Since manual black-box testing of GUI-based APplications (GAPs) is tedious and laborious, test engineers create test scripts to automate the testing process. These test scripts in...
Chen Fu, Mark Grechanik, Qing Xie
CRYPTO
1999
Springer
152views Cryptology» more  CRYPTO 1999»
13 years 12 months ago
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes
Several variations of rooted tree based solutions have been recently proposed for member revocation in multicast communications [18, 19, 20, 21]. In this paper, we show that by ass...
Radha Poovendran, John S. Baras
AUSDM
2008
Springer
212views Data Mining» more  AUSDM 2008»
13 years 9 months ago
Clustering and Classification of Maintenance Logs using Text Data Mining
Spreadsheets applications allow data to be stored with low development overheads, but also with low data quality. Reporting on data from such sources is difficult using traditiona...
Brett Edwards, Michael Zatorsky, Richi Nayak