Sciweavers

631 search results - page 31 / 127
» Producing reliable software: an experiment
Sort
View
ICSE
2007
IEEE-ACM
14 years 7 months ago
Tracking Code Clones in Evolving Software
Code clones are generally considered harmful in software development, and the predominant approach is to try to eliminate them through refactoring. However, recent research has pr...
Ekwa Duala-Ekoko, Martin P. Robillard
AGILEDC
2005
IEEE
14 years 1 months ago
Staying Agile in Government Software Projects
Can government software projects be agile? What do Scrum and XP practices have to offer in this regulated and highly political environment? In this experience report, I will discu...
Barg Upender
ACSAC
2002
IEEE
14 years 17 days ago
Protecting Data from Malicious Software
Corruption or disclosure of sensitive user documents can be among the most lasting and costly effects of malicious software attacks. Many malicious programs specifically target fi...
Matthew Schmid, Frank Hill, Anup K. Ghosh
KBSE
2005
IEEE
14 years 1 months ago
Automated path generation for software fault localization
Localizing the cause(s) of an observable error lies at the heart of program debugging. Fault localization often proceeds by comparing the failing program run with some “successf...
Tao Wang, Abhik Roychoudhury
MICRO
2003
IEEE
148views Hardware» more  MICRO 2003»
14 years 26 days ago
Fast Secure Processor for Inhibiting Software Piracy and Tampering
Due to the widespread software piracy and virus attacks, significant efforts have been made to improve security for computer systems. For stand-alone computers, a key observation...
Jun Yang 0002, Youtao Zhang, Lan Gao