Sciweavers

1051 search results - page 36 / 211
» Protocols in the use of empirical software engineering artif...
Sort
View
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
14 years 1 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
CSMR
2003
IEEE
14 years 2 months ago
Software Clustering Techniques and the Use of Combined Algorithm
As the age of software systems increases they tend to deviate from their actual design and architecture. It becomes more and more difficult to manage and maintain such systems. We...
M. Saeed, Onaiza Maqbool, Haroon A. Babri, Syed Za...
GECCO
2010
Springer
196views Optimization» more  GECCO 2010»
14 years 1 months ago
Using synthetic test suites to empirically compare search-based and greedy prioritizers
The increase in the complexity of modern software has led to the commensurate growth in the size and execution time of the test suites for these programs. In order to address this...
Zachary D. Williams, Gregory M. Kapfhammer
ECSA
2010
Springer
13 years 6 months ago
Feature-Based Composition of Software Architectures
In Software Product Lines variability refers to the definition and utilization of differences between several products. Feature Diagrams (FD) are a well-known approach to express v...
Carlos Andres Parra, Anthony Cleve, Xavier Blanc, ...
ISESE
2002
IEEE
14 years 1 months ago
'Bad Practice' or 'Bad Methods' -- Are Software Engineering and Ethnographic Discourses Incompatible?
Organisational problems in industry have evoked increased interest in empirical methodologies in the broader software engineering community. In particular, the human role in softw...
Kari Rönkkö, Olle Lindeberg, Yvonne Ditt...