Sciweavers

409 search results - page 62 / 82
» The 3rd Workshop on Open Source Software Engineering
Sort
View
SIGSOFT
2003
ACM
14 years 8 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler
SIGSOFT
2010
ACM
13 years 5 months ago
Growth of newcomer competence: challenges of globalization
The transfer of entire projects to offshore locations, the aging and renewal of core developers in legacy products, the recruiting in fast growing Internet companies, and the part...
Minghui Zhou, Audris Mockus
KBSE
2007
IEEE
14 years 1 months ago
Towards automatic model synchronization from model transformations
The metamodel techniques and model transformation techniques provide a standard way to represent and transform data, especially the software artifacts in software development. How...
Yingfei Xiong, Dongxi Liu, Zhenjiang Hu, Haiyan Zh...
WCRE
2010
IEEE
13 years 5 months ago
Software Process Recovery: Recovering Process from Artifacts
—Often stakeholders, such as developers, managers, or buyers, want to find out what software development processes are being followed within a software project. Their reasons in...
Abram Hindle
ICSM
2005
IEEE
14 years 1 months ago
Comparison of Clustering Algorithms in the Context of Software Evolution
To aid software analysis and maintenance tasks, a number of software clustering algorithms have been proposed to automatically partition a software system into meaningful subsyste...
Jingwei Wu, Ahmed E. Hassan, Richard C. Holt