Technological devices for social networking are produced in droves and networking through media seems to be the way of getting ahead in business. We examine what role technology pl...
Test suite augmentation techniques are used in regression testing to identify code elements affected by changes and to generate test cases to cover those elements. Our preliminary...
Zhihong Xu, Yunho Kim, Moonzoo Kim, Gregg Rotherme...
While many obfuscation schemes proposed, none of them satisfy any strong definition of obfuscation. Furthermore secure generalpurpose obfuscation algorithms have been proven to be...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...
We present the Hermes approach for goal-oriented interaction which includes a methodology for designing goal-based interactions and a process for mapping design artefacts to an ex...
We present the first IDE augmented with static detection of inconsistent paths for simplifying the development and debugging of any application involving XPath expressions. Categ...