Sciweavers

852 search results - page 92 / 171
» Understanding How the Requirements Are Implemented in Source...
Sort
View
HICSS
2008
IEEE
236views Biometrics» more  HICSS 2008»
15 years 11 months ago
A Case Study: Introducing eXtreme Programming in a US Government System Development Project
The US Military’s ability to meet its mission critical requirements calls for increased agility in its information technology development process. The purpose of this case study...
Ann L. Fruhling, Patrick McDonald, Christopher Dun...
MPC
2004
Springer
165views Mathematics» more  MPC 2004»
15 years 9 months ago
Prototyping Generic Programming in Template Haskell
Abstract. Generic Programming deals with the construction of programs that can be applied to many dierent datatypes. This is achieved by parameterizing the generic programs by the...
Ulf Norell, Patrik Jansson
SIGSOFT
2003
ACM
16 years 5 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
ICSE
1999
IEEE-ACM
15 years 8 months ago
Pattern-Based Reverse-Engineering of Design Components
Many reverse-engineering tools have been developed to detract representations from source code. Yet, most of these tools completely ignore recovery of the all-important rationale ...
Rudolf K. Keller, Reinhard Schauer, Sébasti...
BSDCON
2003
15 years 5 months ago
Reasoning about SMP in FreeBSD
While the subject of SMP locking primitives has been well covered in the literature [Val][Schm][Bald][Leh], there has been relatively little discussion on the rationale and proces...
Jeffrey Hsu