Sciweavers

927 search results - page 55 / 186
» Practical Limits on Software Dependability: A Case Study
Sort
View
SOCO
2008
Springer
13 years 7 months ago
Superimposition: A Language-Independent Approach to Software Composition
Superimposition is a composition technique that has been applied successfully in several areas of software development. In order to unify several languages and tools that rely on s...
Sven Apel, Christian Lengauer
ICSE
2008
IEEE-ACM
14 years 8 months ago
An empirical study of the effects of test-suite reduction on fault localization
Fault-localization techniques that utilize information about all test cases in a test suite have been presented. These techniques use various approaches to identify the likely fau...
Yanbing Yu, James A. Jones, Mary Jean Harrold
ESE
2008
112views Database» more  ESE 2008»
13 years 7 months ago
"Cloning considered harmful" considered harmful: patterns of cloning in software
Literature on the topic of code cloning often asserts that duplicating code within a software system is a bad practice, that it causes harm to the system's design and should b...
Cory Kapser, Michael W. Godfrey
ICST
2009
IEEE
14 years 2 months ago
Transforming and Selecting Functional Test Cases for Security Policy Testing
In this paper, we consider typical applications in which the business logic is separated from the access control logic, implemented in an independent component, called the Policy ...
Tejeddine Mouelhi, Yves Le Traon, Benoit Baudry
APBC
2008
231views Bioinformatics» more  APBC 2008»
13 years 9 months ago
Optimal Algorithm for Finding DNA Motifs with Nucleotide Adjacent Dependency
: Finding motifs and the corresponding binding sites is a critical and challenging problem in studying the process of gene expression. String and matrix representations are two pop...
Francis Y. L. Chin, Henry C. M. Leung, Man-Hung Si...