Sciweavers

181 search results - page 28 / 37
» Reverse Engineering Method Stereotypes
Sort
View
VC
2008
156views more  VC 2008»
13 years 7 months ago
Spline-based feature curves from point-sampled geometry
Defining sharp features in a 3D model facilitates a better understanding of the surface and aids geometric processing and graphics applications, such as reconstruction, filtering, ...
Joel Daniels II, Tilo Ochotta, Linh K. Ha, Cl&aacu...
WCRE
2006
IEEE
14 years 1 months ago
"Cloning Considered Harmful" Considered Harmful
Current literature on the topic of duplicated (cloned) code in software systems often considers duplication harmful to the system quality and the reasons commonly cited for duplic...
Cory Kapser, Michael W. Godfrey
WCRE
2003
IEEE
14 years 22 days ago
Problems Creating Task-relevant Clone Detection Reference Data
One prevalent method for evaluating the results of automated software analysis tools is to compare the tools’ output to the judgment of human experts. This evaluation strategy i...
Andrew Walenstein, Nitin Jyoti, Junwei Li, Yun Yan...
ATAL
2006
Springer
13 years 11 months ago
Automated analysis and verification of agent behavior
Comprehending and analyzing agent behavior is an arduous task due to complexities in agent systems and sophistication of agent behaviors, in addition to the common difficulties wi...
Tibor Bosse, Dung N. Lam, K. Suzanne Barber
WCRE
2009
IEEE
14 years 2 months ago
Who are Source Code Contributors and How do they Change?
—Determining who are the copyright owners of a software system is important as they are the individuals and organizations that license the software to its users, and ultimately t...
Massimiliano Di Penta, Daniel M. Germán