Sciweavers

JSS
2007
115views more  JSS 2007»
13 years 11 months ago
A case study in re-engineering to enforce architectural control flow and data sharing
Without rigorous software development and maintenance, software tends to lose its original architectural structure and become difficult to understand and modify. ArchJava, a recen...
Marwan Abi-Antoun, Jonathan Aldrich, Wesley Coelho
JSS
2007
169views more  JSS 2007»
13 years 11 months ago
MDABench: Customized benchmark generation using MDA
This paper describes an approach for generating customized benchmark suites from a software architecture description following a Model Driven Architecture (MDA) approach. The benc...
Liming Zhu, Ngoc Bao Bui, Yan Liu, Ian Gorton
JSS
2007
120views more  JSS 2007»
13 years 11 months ago
The design and evaluation of path matching schemes on compressed control flow traces
A control flow trace captures the complete sequence of dynamically executed basic blocks and function calls. It is usually of very large size and therefore commonly stored in com...
Yongjing Lin, Youtao Zhang, Rajiv Gupta
JSS
2007
174views more  JSS 2007»
13 years 11 months ago
Lessons from applying the systematic literature review process within the software engineering domain
A consequence of the growing number of empirical studies in software engineering is the need to adopt systematic approaches to assessing and aggregating research outcomes in order...
Pearl Brereton, Barbara A. Kitchenham, David Budge...
JSS
2007
118views more  JSS 2007»
13 years 11 months ago
A new imputation method for small software project data sets
Effort prediction is a very important issue for software project management. Historical project data sets are frequently used to support such prediction. But missing data are oft...
Qinbao Song, Martin J. Shepperd
JSS
2007
67views more  JSS 2007»
13 years 11 months ago
Worm-IT - A wormhole-based intrusion-tolerant group communication system
This paper presents Worm-IT, a new intrusion-tolerant group communication system with a membership service and a view-synchronous atomic multicast primitive. The system is intrusi...
Miguel Correia, Nuno Ferreira Neves, Lau Cheuk Lun...
JSS
2007
77views more  JSS 2007»
13 years 11 months ago
Defect prevention in software processes: An action-based approach
Ching-Pao Chang, Chih-Ping Chu
JSS
2007
121views more  JSS 2007»
13 years 11 months ago
SEAL: A secure communication library for building dynamic group key agreement applications
We present the SEcure communicAtion Library (SEAL), a Linux-based C language application programming interface (API) library that implements secure group key agreement algorithms ...
Patrick P. C. Lee, John C. S. Lui, David K. Y. Yau