Sciweavers

WOSS
2004
ACM
14 years 5 months ago
Towards preserving correctness in self-managed software systems
Currently, paradigms such as component-based software development and service-oriented software architectures promote modularization of software systems into highly decoupled and ...
Lieven Desmet, Nico Janssens, Sam Michiels, Frank ...
CSCW
2004
ACM
14 years 5 months ago
Sometimes you need to see through walls: a field study of application programming interfaces
Information hiding is one of the most important and influential principles in software engineering. It prescribes that software modules hide implementation details from other modu...
Cleidson R. B. de Souza, David F. Redmiles, Li-Te ...
CSCW
2004
ACM
14 years 5 months ago
Learning from project history: a case study for software development
The lack of lightweight communication channels and other technical and sociological difficulties make it hard for new members of a non-collocated software development team to lea...
Davor Cubranic, Gail C. Murphy, Janice Singer, Kel...
APLAS
2004
ACM
14 years 5 months ago
Detecting Software Defects in Telecom Applications Through Lightweight Static Analysis: A War Story
In safety-critical and high-reliability systems, software development and maintenance are costly endeavors. The cost can be reduced if software errors can be identified through au...
Tobias Lindahl, Konstantinos F. Sagonas
OOPSLA
2005
Springer
14 years 6 months ago
Estimating software based on use case points
It is well documented that software product cost estimates are notoriously inaccurate across the software industry. Creating accurate cost estimates for software product developme...
Edward R. Carroll
DRMTICS
2005
Springer
14 years 6 months ago
Algorithms to Watermark Software Through Register Allocation
Software security is a significant issue in the Internet age. In order to prevent software from piracy and unauthorized modification, many techniques have been developed. Softwar...
William Zhu, Clark D. Thomborson
DRM
2005
Springer
14 years 6 months ago
Hybrid static-dynamic attacks against software protection mechanisms
Advances in reverse engineering and program analyses have made software extremely vulnerable to malicious host attacks. These attacks typically take the form of intellectual prope...
Matias Madou, Bertrand Anckaert, Bjorn De Sutter, ...
CCS
2005
ACM
14 years 6 months ago
Control-flow integrity
Current software attacks often build on exploits that subvert machine-code execution. The enforcement of a basic safety property, Control-Flow Integrity (CFI), can prevent such at...
Martín Abadi, Mihai Budiu, Úlfar Erl...
CC
2005
Springer
134views System Software» more  CC 2005»
14 years 6 months ago
Jazz: A Tool for Demand-Driven Structural Testing
Software testing to produce reliable and robust software has become vitally important in recent years. Testing is a process by which software quality can be assured through the co...
Jonathan Misurda, James A. Clause, Juliya L. Reed,...
ATAL
2005
Springer
14 years 6 months ago
Lessons learned from autonomous sciencecraft experiment
An Autonomous Science Agent has been flying onboard the Earth Observing One Spacecraft since 2003. This software enables the spacecraft to autonomously detect and responds to scie...
Steve A. Chien, Rob Sherwood, Daniel Tran, Benjami...