Sciweavers

3792 search results - page 211 / 759
» Techniques for Trusted Software Engineering
Sort
View
217
Voted
FIW
2009
166views Communications» more  FIW 2009»
15 years 2 months ago
Feature Interactions in a Software Product Line for E-voting
A significant number of failures in e-voting systems have arisen because of poorly specified requirements, combined with an ad-hoc approach to engineering multiple variations of si...
J. Paul Gibson, Eric Lallet, Jean-Luc Raffy
ICSE
2009
IEEE-ACM
16 years 5 months ago
Tesseract: Interactive visual exploration of socio-technical relationships in software development
Software developers have long known that project success requires a robust understanding of both technical and social linkages. However, research has largely considered these inde...
Anita Sarma, Larry Maccherone, Patrick Wagstrom, J...
ICSE
2009
IEEE-ACM
15 years 11 months ago
How to avoid drastic software process change (using stochastic stability)
Before performing drastic changes to a project, it is worthwhile to thoroughly explore the available options within the current structure of a project. An alternative to drastic c...
Tim Menzies, Steve Williams, Barry W. Boehm, Jairu...
UIST
2009
ACM
15 years 11 months ago
CommunityCommands: command recommendations for software applications
We explore the use of modern recommender system technology to address the problem of learning software applications. Before describing our new command recommender system, we first...
Justin Matejka, Wei Li, Tovi Grossman, George W. F...
WCRE
2008
IEEE
15 years 10 months ago
An Empirical Study of Function Clones in Open Source Software
The new hybrid clone detection tool NICAD combines the strengths and overcomes the limitations of both textbased and AST-based clone detection techniques to yield highly accurate ...
Chanchal Kumar Roy, James R. Cordy