Sciweavers

3792 search results - page 132 / 759
» Techniques for Trusted Software Engineering
Sort
View
160
Voted
TAMODIA
2008
15 years 5 months ago
Learning Key Contexts of Use in the Wild for Driving Plastic User Interfaces Engineering
This paper addresses software plasticity, i.e. the ability of interactive systems to adapt to context of use while preserving user-centered properties. In plasticity, a classical a...
Vincent Ganneau, Gaëlle Calvary, Rachel Demum...
ER
2003
Springer
158views Database» more  ER 2003»
15 years 9 months ago
REF: A Practical Agent-Based Requirement Engineering Framework
Abstract. Requirements Engineering techniques, based on the fundamental notions of agency, i.e., Agent, Goal, and Intentional Dependency, have been recognized as having the potenti...
Paolo Bresciani, Paolo Donzelli
123
Voted
ICSE
2005
IEEE-ACM
16 years 3 months ago
Binary refactoring: improving code behind the scenes
We present Binary Refactoring: a software engineering technique for improving the implementation of programs without modifying their source code. While related to regular refactor...
Eli Tilevich, Yannis Smaragdakis
118
Voted
CAISE
2010
Springer
15 years 2 months ago
Search Computing Systems
Search computing is a novel discipline whose goal is to answer complex, multi-domain queries. Such queries typically require combining in their results domain knowledge extracted ...
Stefano Ceri, Marco Brambilla
124
Voted
ISSRE
2003
IEEE
15 years 9 months ago
A Framework for Tamper Detection Marking of Mobile Applications
Today’s applications are highly mobile; we download software from the Internet, machine executable code arrives attached to electronic mail, and Java applets increase the functi...
Mike Jochen, Lisa M. Marvel, Lori L. Pollock