Sciweavers

3792 search results - page 54 / 759
» Techniques for Trusted Software Engineering
Sort
View
ASWEC
2000
IEEE
14 years 2 months ago
A Survey of Software Development Practices in the New Zealand Software Industry
We report on the software development techniques used in the New Zealand software industry, paying particular attention to requirements gathering. We surveyed a selection of softw...
Lindsay Groves, Ray Nickson, Greg Reeve, Steve Ree...
ICSE
2008
IEEE-ACM
14 years 10 months ago
Scalable detection of semantic clones
Several techniques have been developed for identifying similar code fragments in programs. These similar fragments, referred to as code clones, can be used to identify redundant c...
Mark Gabel, Lingxiao Jiang, Zhendong Su
SIGSOFT
2009
ACM
14 years 10 months ago
Engineering search computing applications: vision and challenges
Search computing is a novel discipline whose goal is to answer complex, multi-domain queries. Such queries typically require combining in their results domain knowledge extracted ...
Marco Brambilla, Stefano Ceri
WCRE
2005
IEEE
14 years 3 months ago
Deobfuscation: Reverse Engineering Obfuscated Code
In recent years, code obfuscation has attracted attention as a low cost approach to improving software security by making it difficult for attackers to understand the inner worki...
Sharath K. Udupa, Saumya K. Debray, Matias Madou
ICSE
2007
IEEE-ACM
14 years 10 months ago
A Technique for Enabling and Supporting Debugging of Field Failures
It is difficult to fully assess the quality of software inhouse, outside the actual time and context in which it will execute after deployment. As a result, it is common for softw...
James A. Clause, Alessandro Orso