We report on the software development techniques used in the New Zealand software industry, paying particular attention to requirements gathering. We surveyed a selection of softw...
Lindsay Groves, Ray Nickson, Greg Reeve, Steve Ree...
Several techniques have been developed for identifying similar code fragments in programs. These similar fragments, referred to as code clones, can be used to identify redundant c...
Search computing is a novel discipline whose goal is to answer complex, multi-domain queries. Such queries typically require combining in their results domain knowledge extracted ...
In recent years, code obfuscation has attracted attention as a low cost approach to improving software security by making it difficult for attackers to understand the inner worki...
It is difficult to fully assess the quality of software inhouse, outside the actual time and context in which it will execute after deployment. As a result, it is common for softw...