Sciweavers

852 search results - page 65 / 171
» Understanding How the Requirements Are Implemented in Source...
Sort
View
ICSM
2008
IEEE
15 years 10 months ago
Supporting software evolution analysis with historical dependencies and defect information
More than 90% of the cost of software is due to maintenance and evolution. Understanding the evolution of large software systems is a complex problem, which requires the use of va...
Marco D'Ambros
TACAS
2007
Springer
108views Algorithms» more  TACAS 2007»
15 years 10 months ago
State of the Union: Type Inference Via Craig Interpolation
The ad-hoc use of unions to encode disjoint sum types in C programs and the inability of C’s type system to check the safe use of these unions is a long standing source of subtle...
Ranjit Jhala, Rupak Majumdar, Ru-Gang Xu
BIOID
2008
149views Biometrics» more  BIOID 2008»
15 years 6 months ago
Additive Block Coding Schemes for Biometric Authentication with the DNA Data
Abstract. To implement a biometric authentication scheme, the templates of a group of people are stored in the database (DB) under the names of these people. Some person presents a...
Vladimir B. Balakirsky, Anahit R. Ghazaryan, A. J....
AGILEDC
2007
IEEE
15 years 10 months ago
The Agile Maturity Map A Goal Oriented Approach to Agile Improvement
Fulfilling the potential of Agile development depends on people truly wanting to change how they work. Transitioning to new methods of development is particularly daunting in a la...
Jay Packlick
IWPC
2006
IEEE
15 years 10 months ago
Towards a Client Driven Characterization of Class Hierarchies
Object-oriented legacy systems are hard to maintain because they are hard to understand. One of the main understanding problems is revealed by the so-called ”yo-yo effect” tha...
Petru Florin Mihancea