Sciweavers

3792 search results - page 98 / 759
» Techniques for Trusted Software Engineering
Sort
View
118
Voted
ICSM
1998
IEEE
15 years 7 months ago
Identification of Data Cohesive Subsystems Using Data Mining Techniques
The activity of reengineering and maintaining large legacy systems involves the use of design recovery es to produce abstractions that facilitate the understanding of the system. ...
Carlos Montes de Oca, Doris L. Carver
181
Voted
CISIS
2011
IEEE
14 years 3 months ago
Improving Scheduling Techniques in Heterogeneous Systems with Dynamic, On-Line Optimisations
—Computational performance increasingly depends on parallelism, and many systems rely on heterogeneous resources such as GPUs and FPGAs to accelerate computationally intensive ap...
Marcin Bogdanski, Peter R. Lewis, Tobias Becker, X...
118
Voted
IEE
2008
100views more  IEE 2008»
15 years 3 months ago
A lightweight technique for assessing risks in requirements analysis
: A simple and practical technique for assessing the risks, that is, the potential for error, and consequent loss, in software system development, acquired during a requirements en...
Kenneth Boness, Anthony Finkelstein, Rachel Harris...
MODELS
2009
Springer
15 years 10 months ago
Towards systematic ensuring well-formedness of software product lines
Variability modelling with feature models is one key technique for specifying the problem space of software product lines (SPLs). To allow for the automatic derivation of a concre...
Florian Heidenreich
108
Voted
UIST
2003
ACM
15 years 8 months ago
VisionWand: interaction techniques for large displays using a passive wand tracked in 3D
A passive wand tracked in 3D using computer vision techniques is explored as a new input mechanism for interacting with large displays. We demonstrate a variety of interaction tec...
Xiang Cao, Ravin Balakrishnan