Sciweavers

283 search results - page 8 / 57
» Software Inspections We Can Trust
Sort
View
ISSRE
2006
IEEE
14 years 1 months ago
Detecting Redundant Unit Tests for AspectJ Programs
Aspect-oriented software development is gaining popularity with the adoption of languages such as AspectJ. Testing is an important part in any software development, including aspe...
Tao Xie, Jianjun Zhao, Darko Marinov, David Notkin
ICSE
2008
IEEE-ACM
14 years 8 months ago
The effect of the number of inspectors on the defect estimates produced by capture-recapture models
Inspections can be made more cost-effective by using capturerecapture methods to estimate post-inspection defects. Previous capture-recapture studies of inspections used relativel...
Gursimran Singh Walia, Jeffrey C. Carver, Nachiapp...
ICSE
2007
IEEE-ACM
14 years 7 months ago
Managing Impacts of Security Protocol Changes in Service-Oriented Applications
We present a software tool and a framework for security protocol change management. While we focus on trust negotiation protocols in this paper, many of the ideas are generally ap...
Halvard Skogsrud, Boualem Benatallah, Fabio Casati...
CISIS
2010
IEEE
14 years 2 months ago
Extending Security-by-Contract with Quantitative Trust on Mobile Devices
Abstract—Security-by-Contract (S×C) is a paradigm providing security assurances for mobile applications. In this work, we present an extension of S×C enriched with an automatic...
Gabriele Costa, Nicola Dragoni, Aliaksandr Lazousk...
ICSM
1999
IEEE
13 years 11 months ago
Hot Spot Recovery in Object-Oriented Software with Inheritance and Composition Template Methods
The success of an object-oriented software development project highly depends on how well the designers can capture the Hot Spots of the application domain, that is, those aspects...
Reinhard Schauer, Sébastien Robitaille, Fra...