Sciweavers

412 search results - page 63 / 83
» Refactoring
Sort
View
ICSE
2007
IEEE-ACM
14 years 11 months ago
Testing and Analysis of Access Control Policies
Policy testing and analysis are important techniques for high assurance of correct specification of access control policies. We propose a set of testing and analysis techniques fo...
Evan Martin
HICSS
2010
IEEE
199views Biometrics» more  HICSS 2010»
14 years 5 months ago
Software Entropy in Agile Product Evolution
As agile software development principles and methods are being adopted by large software product organizations it is important to understand the role of software entropy. That is,...
Geir Kjetil Hanssen, Aiko Fallas Yamashita, Reidar...
FASE
2010
Springer
14 years 5 months ago
Are Popular Classes More Defect Prone?
Traces of the evolution of software systems are left in a number of different repositories: such as configuration management systems, bug tracking systems, mailing lists. Develope...
Alberto Bacchelli, Marco D'Ambros, Michele Lanza
CBMS
2009
IEEE
14 years 5 months ago
HL7 healthcare information management using aspect-oriented programming
Given the heterogeneity of healthcare software systems, data from each system is often incompatible inhibiting interoperability. To enable the sharing and exchange of healthcare i...
Jennifer Munnelly, Siobhán Clarke
WISE
2009
Springer
14 years 5 months ago
Multi-synchronous Collaborative Semantic Wikis
Semantic wikis have opened an interesting way to mix Web 2.0 advantages with the Semantic Web approach. However, compared to other collaborative tools, wikis do not support all col...
Charbel Rahhal, Hala Skaf-Molli, Pascal Molli, St&...