Sciweavers

1040 search results - page 94 / 208
» The Role of Controlled Experiments in Software Engineering R...
Sort
View
SIGSOFT
2008
ACM
16 years 5 months ago
Automatically locating framework extension examples
Using and extending a framework is a challenging task whose difficulty is exacerbated by the poor documentation that generally comes with the framework. Even in the presence of do...
Barthélémy Dagenais, Harold Ossher
MSR
2010
ACM
15 years 9 months ago
Mining Challenge 2010: FreeBSD, GNOME Desktop and Debian/Ubuntu
Abstract—In a young field, such as Mining Software Repositories (MSR), there is always a call for benchmarks so that researchers can compare their results against others. Thus i...
Abram Hindle, Israel Herraiz, Emad Shihab, Zhen Mi...
155
Voted
ICST
2010
IEEE
15 years 3 months ago
Searching for a Needle in a Haystack: Predicting Security Vulnerabilities for Windows Vista
—Many factors are believed to increase the vulnerability of software system; for example, the more widely deployed or popular is a software system the more likely it is to be att...
Thomas Zimmermann, Nachiappan Nagappan, Laurie A. ...
163
Voted
EDBT
2008
ACM
171views Database» more  EDBT 2008»
16 years 4 months ago
Replay-based approaches to revision processing in stream query engines
Data stream processing systems have become ubiquitous in academic and commercial sectors, with application areas that include financial services, network traffic analysis, battlef...
Anurag Maskey, Mitch Cherniack
COMPSAC
2002
IEEE
15 years 9 months ago
An Architecture-Based Approach for Component-Oriented Development
Component-based reuse is a hopeful solution to the software crisis. Research on software architecture (SA) has revealed a component-based vision of the gross structure of software...
Feng Chen, Qianxiang Wang, Hong Mei, Fuqing Yang