Sciweavers

3792 search results - page 138 / 759
» Techniques for Trusted Software Engineering
Sort
View
148
Voted
CSMR
2004
IEEE
15 years 7 months ago
The Weighted Combined Algorithm: A Linkage Algorithm for Software Clustering
Software systems need to evolve as business requirements, technology and environment change. As software is modified to accommodate the required changes, its structure deteriorate...
Onaiza Maqbool, Haroon A. Babri
POPL
2006
ACM
16 years 4 months ago
Engineering with logic: HOL specification and symbolic-evaluation testing for TCP implementations
The TCP/IP protocols and Sockets API underlie much of modern computation, but their semantics have historically been very complex and ill-defined. The real standard is the de fact...
Steve Bishop, Matthew Fairbairn, Michael Norrish, ...
TSE
1998
115views more  TSE 1998»
15 years 3 months ago
Integration and Analysis of Use Cases Using Modular Petri Nets in Requirements Engineering
—It is well known that requirements engineering plays a critical role in software quality. The use case approach is a requirements elicitation technique commonly used in industri...
Woo Jin Lee, Sung Deok Cha, Yong Rae Kwon
AVI
2006
15 years 5 months ago
Shakespeare's complete works as a benchmark for evaluating multiscale document navigation techniques
In this paper, we describe an experimental platform dedicated to the comparative evaluation of multiscale electronic-document navigation techniques. One noteworthy characteristic ...
Yves Guiard, Michel Beaudouin-Lafon, Yangzhou Du, ...
KBSE
2009
IEEE
15 years 10 months ago
Evaluating the Accuracy of Fault Localization Techniques
—We investigate claims and assumptions made in several recent papers about fault localization (FL) techniques. Most of these claims have to do with evaluating FL accuracy. Our in...
Shaimaa Ali, James H. Andrews, Tamilselvi Dhandapa...