Sciweavers

ICSM
2003
IEEE
14 years 5 months ago
Deriving tolerant grammars from a base-line grammar
A grammar-based approach to tool development in re- and reverse engineering promises precise structure awareness, but it is problematic in two respects. Firstly, it is a considera...
Steven Klusener, Ralf Lämmel
ICSM
2003
IEEE
14 years 5 months ago
Source Code Based Function Point Analysis for Enhancement Projects
Function point analysis is a well known established method to estimate the size of software systems and software projects. However, because it is based on functional documentation...
Steven Klusener
ICSM
2003
IEEE
14 years 5 months ago
Software Systems Integration and Architectural Analysis - A Case Study
Software systems no longer evolve as separate entities but are also integrated with each other. The purpose of integrating software systems can be to increase user-value or to dec...
Rikard Land, Ivica Crnkovic
ICSM
2003
IEEE
14 years 5 months ago
Source-Based Software Risk Assessment
The paper reports on a method for software risk assessments that takes into account “primary facts” and “secondary facts”. Primary facts are those obtained through automat...
Arie van Deursen, Tobias Kuipers
ICSM
2003
IEEE
14 years 5 months ago
A Framework for Understanding Conceptual Changes in Evolving Source Code
As systems evolve, they become harder to understand because the implementation of concepts (e.g. business rules) becomes less coherent. To preserve source code comprehensibility, ...
Nicolas Gold, Andrew Mohan
ICSM
2003
IEEE
14 years 5 months ago
Towards a Versioning Model for Component-based Software Assembly
The world of software development has rapidly changed in the last few years due to the adoption of component-based technologies. The classical software configuration management, ...
Jaroslav Gergic
ICSM
2003
IEEE
14 years 5 months ago
Characterizing the 'Security Vulnerability Likelihood' of Software Functions
Software maintainers and auditors would benefit from a tool to help them focus their attention on functions that are likely to be the source of security vulnerabilities. However,...
Dan DaCosta, Christopher Dahn, Spiros Mancoridis, ...
ICSM
2003
IEEE
14 years 5 months ago
An Environment for Managing Evolving Product Line Architectures
The use of product lines is recognized as beneficial in promoting and structuring both component and architecture reuse throughout an organization. While the business practices of...
Akash Garg, Matt Critchlow, Ping Chen, Christopher...
ICSM
2003
IEEE
14 years 5 months ago
Populating a Release History Database from Version Control and Bug Tracking Systems
Version control and bug tracking systems contain large amounts of historical information that can give deep insight into the evolution of a software project. Unfortunately, these ...
Michael Fischer, Martin Pinzger, Harald Gall
ICSM
2003
IEEE
14 years 5 months ago
Safe Upgrading without Restarting
The distributed development and maintenance paradigm for component delivery is fraught with problems. One wants a relationship between developers and clients that is autonomous an...
Miles Barr, Susan Eisenbach