—Secure Computation (SC) enables secure distributed computation of arbitrary functions of private inputs. It has many useful applications, e.g. benchmarking or auctions. Several ...
Abstract. The build architecture of legacy C/C++ software systems, groups program files in directories to represent logical components. The interfaces of these components are loos...
Homayoun Dayani-Fard, Yijun Yu, John Mylopoulos, P...
We present an iterative, reading-based methodology for analyzing defects in source code when change history is available. Our bottom-up approach can be applied to build knowledge ...
Code clone management has been shown to have several benefits for software developers. When source code evolves, clone management requires a mechanism to efficiently and increme...
Tung Thanh Nguyen, Hoan Anh Nguyen, Jafar M. Al-Ko...
This paper analyzes the reflections of an agile team, developing a large-scale project in an industry setting. The team uses an Iteration Summary Meeting practice, which includes ...
David Talby, Orit Hazzan, Yael Dubinsky, Arie Kere...