Sciweavers

1051 search results - page 127 / 211
» Protocols in the use of empirical software engineering artif...
Sort
View
SAC
2010
ACM
13 years 9 months ago
Graph-based verification of static program constraints
Software artifacts usually have static program constraints and these constraints should be satisfied in each reuse. In addition to this, the developers are also required to satisf...
Selim Ciraci, Pim van den Broek, Mehmet Aksit
CODES
2001
IEEE
14 years 18 days ago
A practical tool box for system level communication synthesis
This paper presents a practical approach to communication synthesis for hardware/software system specified as tasks communicating through lossless blocking channels. It relies on ...
Denis Hommais, Frédéric Pétro...
ICSE
2010
IEEE-ACM
13 years 6 months ago
Identifying crosscutting concerns using historical code changes
Detailed knowledge about implemented concerns in the source code is crucial for the cost-effective maintenance and successful evolution of large systems. Concern mining techniques...
Bram Adams, Zhen Ming Jiang, Ahmed E. Hassan
ICSE
2008
IEEE-ACM
14 years 9 months ago
Data flow testing of service-oriented workflow applications
WS-BPEL applications are a kind of service-oriented application. They use XPath extensively to integrate loosely-coupled workflow steps. However, XPath may extract wrong data from...
Lijun Mei, W. K. Chan, T. H. Tse
SOFTVIS
2003
ACM
14 years 2 months ago
Visualizing Software for Telecommunication Services
An active research area in telecommunications concerns how to specify and control the addition of new services, such as call waiting or instant messaging, into existing software. ...
Emden R. Gansner, John M. Mocenigo, Stephen C. Nor...