There exists a large variety of techniques to detect and correct software security vulnerabilities at the source code level, including human code reviews, testing, and static anal...
— Currently there are different approaches to develop fault-tolerant embedded software: implementing the system from scratch or using libraries respectively specialized hardware....
The use of several distinct recovery procedures is one of the techniques that can be used to ensure high availability and fault-tolerance of computer systems. This method has been...
Sergiy A. Vilkomir, David Lorge Parnas, Veena B. M...
We perform knowledge discovery in software archives in order to detect refactorings on the level of classes and methods. Our REFVIS prototype finds these refactorings in CVS repo...
Quality is a fundamental concept in software and information system development. It is also a complex and elusive concept. A large number of quality models have been developed for...
Hong Zhu, Yanlong Zhang, Qingning Huo, Sue Greenwo...