Sciweavers

852 search results - page 64 / 171
» Understanding How the Requirements Are Implemented in Source...
Sort
View
TPHOL
2007
IEEE
15 years 10 months ago
Using XCAP to Certify Realistic Systems Code: Machine Context Management
Formal, modular, and mechanized verification of realistic systems code is desirable but challenging. Verification of machine context management (a basis of multi-tasking) is one ...
Zhaozhong Ni, Dachuan Yu, Zhong Shao
ICNP
2006
IEEE
15 years 10 months ago
On the Practical and Security Issues of Batch Content Distribution Via Network Coding
— File distribution via network coding has received a lot of attention lately. However, direct application of network coding may have security problems. In particular, attackers ...
Qiming Li, Dah-Ming Chiu, John C. S. Lui
IWPC
2009
IEEE
15 years 11 months ago
Resumption strategies for interrupted programming tasks
Interruptions are a daily reality for professional programmers. Unfortunately, the strategies programmers use to recover lost knowledge and resume work have not yet been well stud...
Chris Parnin, Spencer Rugaber
IWPC
2005
IEEE
15 years 9 months ago
Detecting and Visualizing Refactorings from Software Archives
We perform knowledge discovery in software archives in order to detect refactorings on the level of classes and methods. Our REFVIS prototype finds these refactorings in CVS repo...
Carsten Görg, Peter Weißgerber
SDL
2001
78views Hardware» more  SDL 2001»
15 years 5 months ago
Using Message Sequence Charts to Accelerate Maintenance of Existing Systems
In this paper we describe our experiences in building tools for accelerating maintenance of existing large telecommunications software. We discuss how various maintenance activitie...
Nikolai Mansurov, Djenana Campara