Sciweavers

111 search results - page 18 / 23
» icse 2008
Sort
View
ICSE
2008
IEEE-ACM
14 years 10 months ago
Security metrics for source code structures
Software security metrics are measurements to assess security related imperfections (or perfections) introduced during software development. A number of security metrics have been...
Istehad Chowdhury, Brian Chan, Mohammad Zulkernine
ICSE
2008
IEEE-ACM
14 years 10 months ago
A value-based approach for documenting design decisions rationale: a replicated experiment
The explicit documentation of the rationale of design decisions is a practice generally encouraged but rarely implemented in industry because of a variety of inhibitors. Known met...
Davide Falessi, Rafael Capilla, Giovanni Cantone
ICSE
2008
IEEE-ACM
14 years 10 months ago
An ontology-driven software architecture evaluation method
Software architecture evaluation has a crucial role in the life cycle of software intensive systems. In this paper we propose an approach to empower a software architecture evalua...
Aida Erfanian, Fereidoun Shams Aliee
ICSE
2008
IEEE-ACM
14 years 10 months ago
Exploiting connector knowledge to efficiently disseminate highly voluminous data sets
Ever-growing amounts of data that must be distributed from data providers to consumers across the world necessitate a greater understanding of the software architectural implicati...
Chris Mattmann, David Woollard, Nenad Medvidovic
CP
2008
Springer
13 years 11 months ago
Exploiting Common Subexpressions in Numerical CSPs
It is acknowledged that the symbolic form of the equations is crucial for interval-based solving techniques to efficiently handle systems of equations over the reals. However, only...
Ignacio Araya, Bertrand Neveu, Gilles Trombettoni