Sciweavers

3792 search results - page 61 / 759
» Techniques for Trusted Software Engineering
Sort
View
CSMR
2005
IEEE
14 years 3 months ago
Applying Webmining Techniques to Execution Traces to Support the Program Comprehension Process
Well-designed object-oriented programs typically consist of a few key classes that work tightly together to provide the bulk of the functionality. As such, these key classes are e...
Andy Zaidman, Toon Calders, Serge Demeyer, Jan Par...
ATC
2007
Springer
14 years 4 months ago
Building Autonomic and Secure Service Oriented Architectures with MAWeS
Service-oriented architectures (SOA) and, in particular, Web Services designs are currently widely used for the development of open, large-scale interoperable systems. In those sys...
Valentina Casola, Emilio Pasquale Mancini, Nicola ...
PLDI
2010
ACM
14 years 2 months ago
Bringing Extensibility to Verified Compilers
Verified compilers, such as Leroy's CompCert, are accompanied by a fully checked correctness proof. Both the compiler and proof are often constructed with an interactive proo...
Zachary Tatlock, Sorin Lerner
CSMR
2000
IEEE
14 years 2 months ago
Architectural Design Recovery using Data Mining Techniques
This paper presents a technique for recovering the high level design of legacy software systems according to user defined architectural plans. Architectural plans are represented...
Kamran Sartipi, Kostas Kontogiannis, Farhad Mavadd...
EUROMICRO
2005
IEEE
14 years 3 months ago
Visual Assessment Techniques for Component-Based Framework Evolution
Many component models have been proposed to address the challenge of reducing software development time and costs. Such models often offer similar functionality. We study how deve...
Lucian Voinea, Alexandru Telea