Sciweavers

1051 search results - page 81 / 211
» Protocols in the use of empirical software engineering artif...
Sort
View
COMPSAC
2003
IEEE
14 years 2 months ago
Facilitating Secure Ad hoc Service Discovery in Public Environments
Securely accessing unfamiliar services in public environments using ad hoc wireless networks is challenging. We present a proxy-based approach that uses other existing network cha...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
APSEC
2003
IEEE
14 years 2 months ago
Ensuring Compatible Interactions within Component-based Software Systems
The interface definition of a component in a distributed system forms the contract between the component itself and its neighbouring components regarding the use of its services....
Jun Han, Ksze Kae Ker
SIGSOFT
2008
ACM
14 years 9 months ago
Using assertions to help end-user programmers create dependable web macros
Web macros give web browser users ways to "program" tedious tasks, allowing those tasks to be repeated more quickly and reliably than when performed by hand. Web macros ...
Andhy Koesnandar, Sebastian G. Elbaum, Gregg Rothe...
ISESE
2006
IEEE
14 years 2 months ago
Using observational pilot studies to test and improve lab packages
Controlled experiments are a key approach to evaluate and evolve our understanding of software engineering technologies. However, defining and running a controlled experiment is a...
Manoel G. Mendonça, Daniela Cruzes, Josemei...
GECCO
2009
Springer
156views Optimization» more  GECCO 2009»
14 years 3 months ago
Insight knowledge in search based software testing
Software testing can be re-formulated as a search problem, hence search algorithms (e.g., Genetic Algorithms) can be used to tackle it. Most of the research so far has been of emp...
Andrea Arcuri