Sciweavers

3792 search results - page 101 / 759
» Techniques for Trusted Software Engineering
Sort
View
145
Voted
ECSCW
2011
14 years 3 months ago
The Hugging Team: The Role of Technology in Business Networking Practices
Technological devices for social networking are produced in droves and networking through media seems to be the way of getting ahead in business. We examine what role technology pl...
Anne Thorsø Sørensen, Irina Shklovsk...
151
Voted
SIGSOFT
2010
ACM
15 years 1 months ago
Directed test suite augmentation: techniques and tradeoffs
Test suite augmentation techniques are used in regression testing to identify code elements affected by changes and to generate test cases to cover those elements. Our preliminary...
Zhihong Xu, Yunho Kim, Moonzoo Kim, Gregg Rotherme...
CCS
2008
ACM
15 years 5 months ago
Towards experimental evaluation of code obfuscation techniques
While many obfuscation schemes proposed, none of them satisfy any strong definition of obfuscation. Furthermore secure generalpurpose obfuscation algorithms have been proven to be...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...
107
Voted
ATAL
2005
Springer
15 years 9 months ago
Hermes: a methodology for goal oriented agent interactions
We present the Hermes approach for goal-oriented interaction which includes a methodology for designing goal-based interactions and a process for mapping design artefacts to an ex...
Christopher Cheong, Michael Winikoff
123
Voted
ICSE
2011
IEEE-ACM
14 years 7 months ago
Inconsistent path detection for XML IDEs
We present the first IDE augmented with static detection of inconsistent paths for simplifying the development and debugging of any application involving XPath expressions. Categ...
Pierre Genevès, Nabil Layaïda