Sciweavers

CBSE
2008
Springer
13 years 9 months ago
Structural Testing of Component-Based Systems
Component based development of software systems needs to devise effective test management strategies in order fully achieve its perceived advantages of cost efficiency, flexibility...
Daniel Sundmark, Jan Carlson, Sasikumar Punnekkat,...
CBSE
2008
Springer
13 years 9 months ago
State Space Reduction Techniques for Component Interfaces
Abstract. Automata-based interface and protocol specifications provide an elegant framework to capture and automatically verify the interactive behavior of component-based software...
Markus Lumpe, Lars Grunske, Jean-Guy Schneider
CBSE
2008
Springer
13 years 9 months ago
A Practical Approach for Finding Stale References in a Dynamic Service Platform
The OSGiTM Service Platform is becoming the de facto standard for modularized Java applications. The market of OSGi based COTS components is continuously growing. OSGi specific pro...
Kiev Gama, Didier Donsez
C3S2E
2008
ACM
13 years 9 months ago
Context-sensitive cut, copy, and paste
Creating and editing source code are tedious and error-prone processes. One important source of errors in editing programs is the failure to correctly adapt a block of copied code...
Reid Kerr, Wolfgang Stürzlinger
C3S2E
2008
ACM
13 years 9 months ago
Evenness preserving operations on musical rhythms
In this paper we define four operations on musical rhythms that preserve a property called maximal evenness. The operations we describe are shadow, complementation, concatenation,...
Francisco Gomez-Martin, Perouz Taslakian, Godfried...
C3S2E
2008
ACM
13 years 9 months ago
Revisiting 2DR-tree insertion
We take another look at the 2DR-tree. In particular, we revisit its node structure, validity rules and the insertion strategy. The 2DR-tree uses 2D nodes so that the relationships...
Marc Moreau, Wendy Osborn
C3S2E
2008
ACM
13 years 9 months ago
Towards a mutation-based automatic framework for evaluating code clone detection tools
In the last decade, a great many code clone detection tools have been proposed. Such a large number of tools calls for a quantitative comparison, and there have been several attem...
Chanchal Kumar Roy, James R. Cordy
C3S2E
2008
ACM
13 years 9 months ago
Integer least squares: sphere decoding and the LLL algorithm
This paper considers the problem of integer least squares, where the least squares solution is an integer vector, whereas the coefficient matrix is real. In particular, we discuss...
Sanzheng Qiao
ICSE
2010
IEEE-ACM
13 years 9 months ago
Managing iterations with UNICASE
Planning iterations in software projects requires considering artifacts from different aspects such as requirements, specifications, tasks or even bug reports. UNICASE is a unifie...
Jonas Helming, Maximilian Koegel