Sciweavers

336 search results - page 61 / 68
» Source coding and channel requirements for unstable processe...
Sort
View
KBSE
2007
IEEE
14 years 2 months ago
Automated detection of api refactorings in libraries
Software developers often do not build software from scratch but reuse software libraries. In theory, the APIs of a library should be stable, but in practice they do change and th...
Kunal Taneja, Danny Dig, Tao Xie
MSR
2005
ACM
14 years 2 months ago
Mining evolution data of a product family
Diversiļ¬cation of software assets through changing requirements impose a constant challenge on the developers and maintainers of large software systems. Recent research has addr...
Michael Fischer, Johann Oberleitner, Jacek Ratzing...
AUSDM
2006
Springer
100views Data Mining» more  AUSDM 2006»
14 years 5 days ago
Data Mining Methodological Weaknesses and Suggested Fixes
Predictive accuracy claims should give explicit descriptions of the steps followed, with access to the code used. This allows referees and readers to check for common traps, and t...
John H. Maindonald
DSN
2008
IEEE
13 years 10 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
DOCENG
2010
ACM
13 years 9 months ago
Linking data and presentations: from mapping to active transformations
Modern GUI toolkits, and especially RIA ones, propose the concept of binding to dynamically link domain data and their presentations. Bindings are very simple to use for predefine...
Olivier Beaudoux, Arnaud Blouin