Sciweavers

295 search results - page 9 / 59
» Severity Levels of Inconsistent Code
Sort
View
ITCC
2005
IEEE
14 years 3 months ago
Formalisation and implementation of Access control models
Access control software must be based on a security policy model. Flaws in them may come from a lack of precision or some incoherences in the policy model or from inconsistencies ...
Mathieu Jaume, Charles Morisset
ICSM
1999
IEEE
14 years 1 months ago
Maintaining Traceability During Object-Oriented Software Evolution: A Case Study
This paper presents an approach to build and visualize traceability links and properties of a set of OO software releases. The process recovers an "as is" design from C+...
Giuliano Antoniol, Gerardo Canfora, Andrea De Luci...
ICSM
2009
IEEE
14 years 4 months ago
Scalable and incremental clone detection for evolving software
Code clone management has been shown to have several benefits for software developers. When source code evolves, clone management requires a mechanism to efficiently and increme...
Tung Thanh Nguyen, Hoan Anh Nguyen, Jafar M. Al-Ko...
ACSD
2001
IEEE
112views Hardware» more  ACSD 2001»
14 years 1 months ago
Software Implementation of Synchronous Programs
Synchronous languages allow a high level, concurrent, and deterministic description the behavior of reactive systems. Thus, they can be used advantageously for the programming of ...
Charles Andre, Frédéric Boulanger, A...
CODES
2006
IEEE
14 years 3 months ago
Generic netlist representation for system and PE level design exploration
Designer productivity and design predictability are vital factors for successful embedded system design. Shrinking time-to-market and increasing complexity of these systems requir...
Bita Gorjiara, Mehrdad Reshadi, Pramod Chandraiah,...