Sciweavers

1051 search results - page 50 / 211
» Protocols in the use of empirical software engineering artif...
Sort
View
VMCAI
2009
Springer
14 years 3 months ago
Finding Concurrency-Related Bugs Using Random Isolation
This paper describes the methods used in Empire, a tool to detect concurrency-related bugs, namely atomic-set serializability violations in Java programs. The correctness criterion...
Nicholas Kidd, Thomas W. Reps, Julian Dolby, Manda...
SIGSOFT
2007
ACM
14 years 9 months ago
Reconciling software configuration management and product data management
Product Data Management (PDM) and Software Configuration Management (SCM) are the disciplines of building and controlling the evolution of a complex artifacts; either physical or ...
Germán Vega, Jacky Estublier
SEFM
2007
IEEE
14 years 3 months ago
Verifying Security Properties of Cryptoprotocols: A Novel Approach
We model security protocols as a game tree using concepts of game semantics. Using this model we ascribe semantics to protocols written in the standard simple arrow notation. Acco...
Mohamed Saleh, Mourad Debbabi
SEKE
2010
Springer
13 years 7 months ago
An Empirical Evaluation on the Relationship Between Final Auction Price and Shilling Activity in Online Auctions
In this paper, we are interested in the relationship between final prices of online auctions and possible shill activities during those auctions. We conduct experiments on real auc...
Fei Dong, Sol M. Shatz, Haiping Xu
XPU
2007
Springer
14 years 2 months ago
Empirical Evidence Principle and Joint Engagement Practice to Introduce XP
Bringing software process change to an organisation is a real challenge. The authors have shown a sample attempt to carry out a process change and then reflected on its results and...
Lech Madeyski, Wojciech Biela