Sciweavers

IOLTS
2005
IEEE
120views Hardware» more  IOLTS 2005»
14 years 1 months ago
Side-Channel Issues for Designing Secure Hardware Implementations
Selecting a strong cryptographic algorithm makes no sense if the information leaks out of the device through sidechannels. Sensitive information, such as secret keys, can be obtai...
Lejla Batina, Nele Mentens, Ingrid Verbauwhede
IOLTS
2005
IEEE
163views Hardware» more  IOLTS 2005»
14 years 1 months ago
Modeling Soft-Error Susceptibility for IP Blocks
As device geometries continue to shrink, single event upsets are becoming of concern to a wider spectrum of system designers. These “soft errors” can be a nuisance or catastro...
Robert C. Aitken, Betina Hold
ICSM
2005
IEEE
14 years 1 months ago
Using Self-Reconfigurable Workplaces to Automate the Maintenance of Evolving Business Applications
In this ever changing business environment, business processes are constantly being customized to reflect the up-to-date organizational structure and business objectives. Technolo...
Qi Zhang, Ying Zou
ICSM
2005
IEEE
14 years 1 months ago
Reducing Build Time through Precompilations for Evolving Large Software
Large-scale legacy programs take long time to compile, thereby hampering productivity. This paper presents algorithms that reduce compilation time by analyzing syntactic dependenc...
Yijun Yu, Homayoun Dayani-Fard, John Mylopoulos, P...
ICSM
2005
IEEE
14 years 1 months ago
Rapid "Crash Testing" for Continuously Evolving GUI-Based Software Applications
Several rapid-feedback-based quality assurance mechanisms are used to manage the quality of continuously evolving software. Even though graphical user interfaces (GUIs) are one of...
Qing Xie, Atif M. Memon
ICSM
2005
IEEE
14 years 1 months ago
Comparison of Clustering Algorithms in the Context of Software Evolution
To aid software analysis and maintenance tasks, a number of software clustering algorithms have been proposed to automatically partition a software system into meaningful subsyste...
Jingwei Wu, Ahmed E. Hassan, Richard C. Holt
ICSM
2005
IEEE
14 years 1 months ago
A Safe Regression Test Selection Technique for Database-Driven Applications
Regression testing is a widely-used method for checking whether modifications to software systems have adversely affected the overall functionality. This is potentially an expens...
David Willmor, Suzanne M. Embury
ICSM
2005
IEEE
14 years 1 months ago
A Risk Taxonomy Proposal for Software Maintenance
There can be no doubt that risk management is an important activity in the software engineering area. One proof of this is the large body of work existing in this area. However, w...
Kenia P. Batista Webster, Káthia Març...
ICSM
2005
IEEE
14 years 1 months ago
A collection of C, C++ and Java code understanding and refactoring plugins
This paper presents the Xrefactory project. Xrefactory is a plugin to editors and Integrated Development Environments (IDE) providing a variety of source understanding and refacto...
Marian Vittek, Peter Borovanský, Pierre-Eti...
ICSM
2005
IEEE
14 years 1 months ago
Toward Documentation of Program Evolution
The documentation of a program often falls behind the evolution of the program source files. When this happens it may be attractive to shift the documentation mode from updating ...
Thomas Vestdam, Kurt Nørmark