Sciweavers

1051 search results - page 70 / 211
» Protocols in the use of empirical software engineering artif...
Sort
View
COMSWARE
2006
IEEE
14 years 2 months ago
Case study on the use of SDL for specifying an IETF micro mobility protocol
—Recent protocols are become increasingly complex, and lead to further level of complexity when used in combination, often resulting in ambiguous behavior. This paper, starting f...
Telemaco Melia, Amardeo Sarma, Rui L. Aguiar, Diet...
CBSE
2005
Springer
14 years 2 months ago
Performance Prediction of J2EE Applications Using Messaging Protocols
Abstract. Predicting the performance of component-based applications is difficult due to the complexity of the underlying component technology. This problem is exacerbated when a m...
Yan Liu, Ian Gorton
INFSOF
2008
85views more  INFSOF 2008»
13 years 8 months ago
Locating dependence structures using search-based slicing
This paper introduces an approach to locating dependence structures in a program by searching the space of the powerset of the set of all possible program slices. The paper formul...
Tao Jiang, Nicolas Gold, Mark Harman, Zheng Li
ESEM
2009
ACM
13 years 6 months ago
Security of open source web applications
In an empirical study of fourteen widely used open source PHP web applications, we found that the vulnerability density of the aggregate code base decreased from 8.88 vulnerabilit...
James Walden, Maureen Doyle, Grant A. Welch, Micha...
CASCON
1996
111views Education» more  CASCON 1996»
13 years 10 months ago
A hybrid process for recovering software architecture
A large portion of the software used in industry today is legacy software. Legacy systems often evolve into dicult to maintain systems whose original design has been lost or else ...
Vassilios Tzerpos, Richard C. Holt