Sciweavers

3792 search results - page 67 / 759
» Techniques for Trusted Software Engineering
Sort
View
104
Voted
ICSE
2009
IEEE-ACM
15 years 1 months ago
Configuration and adaptation of binary software components
Existing black-box adaptation techniques are insufficiently powerful for a large class of real-world tasks. Meanwhile, white-box techniques are language-specificand overly invasiv...
Stephen Kell
155
Voted
ICFCA
2005
Springer
15 years 9 months ago
Lessons Learned in Applying Formal Concept Analysis to Reverse Engineering
A key difficulty in the maintenance and evolution of complex software systems is to recognize and understand the implicit dependencies that define contracts that must be respecte...
Gabriela Arévalo, Stéphane Ducasse, ...
144
Voted
SIGSOFT
2010
ACM
14 years 10 months ago
Thoughts on automated software design and synthesis
I summarize some personal observations on the topic of automated software design and synthesis that I accumulated over twenty years. They are intended to alert researchers to pitf...
Don S. Batory
106
Voted
WCRE
1997
IEEE
15 years 7 months ago
Domain Analysis for Transformational Reuse
Domain analysis is an effective technique for enabling both reuse and reverse engineering. This paper shows how domain analysis can provide a framework for combining reverse engin...
Melody M. Moore, Spencer Rugaber
AVI
2008
15 years 5 months ago
A haptic rendering engine of web pages for blind users
To overcome the shortcomings posed by audio rendering of web pages for blind users, this paper implements an interaction technique where web pages are parsed so as to automaticall...
Nikolaos Kaklanis, Juan Manuel González-Cal...