Sciweavers

1051 search results - page 145 / 211
» Protocols in the use of empirical software engineering artif...
Sort
View
CCS
2009
ACM
14 years 9 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
SIGSOFT
2008
ACM
14 years 9 months ago
Automated identification of parameter mismatches in web applications
Quality assurance techniques for web applications have become increasingly important as web applications have gained in popularity and become an essential part of our daily lives....
William G. J. Halfond, Alessandro Orso
APSEC
2009
IEEE
14 years 3 months ago
Directed Test Suite Augmentation
Abstract—As software evolves, engineers use regression testing to evaluate its fitness for release. Such testing typically begins with existing test cases, and many techniques h...
Zhihong Xu, Gregg Rothermel
ICSE
2009
IEEE-ACM
14 years 3 months ago
Complete and accurate clone detection in graph-based models
Model-Driven Engineering (MDE) has become an important development framework for many large-scale software. Previous research has reported that as in traditional code-based develo...
Nam H. Pham, Hoan Anh Nguyen, Tung Thanh Nguyen, J...
ISESE
2006
IEEE
14 years 2 months ago
Analysis of the influence of communication between researchers on experiment replication
The replication of experiments is a key undertaking in SE. Successful replications enable a discipline’s body of knowledge to grow, as the results are added to those of earlier ...
Sira Vegas, Natalia Juristo Juzgado, Ana Mar&iacut...