Sciweavers

16 search results - page 3 / 4
» Co-evolving Annotations and Source Code through Smart Annota...
Sort
View
WCRE
2005
IEEE
13 years 11 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean
CSCW
2006
ACM
13 years 11 months ago
Shared waypoints and social tagging to support collaboration in software development
This paper presents the conceptual design of TagSEA, a collaborative tool to support asynchronous software development. Our goal is to develop a lightweight source code annotation...
Margaret-Anne D. Storey, Li-Te Cheng, R. Ian Bull,...
BMCBI
2010
240views more  BMCBI 2010»
13 years 5 months ago
TAM: A method for enrichment and depletion analysis of a microRNA category in a list of microRNAs
Background: MicroRNAs (miRNAs) are a class of important gene regulators. The number of identified miRNAs has been increasing dramatically in recent years. An emerging major challe...
Ming Lu, Bing Shi, Juan Wang, Qun Cao, Qinghua Cui
ISSTA
2006
ACM
13 years 11 months ago
Architecture-based testing using goals and plans
This paper presents a specification-based testing approach that compares software specifications defined at different f abstraction, e.g. architecture and implementation, agai...
Kristina Winbladh, Thomas A. Alspaugh, Hadar Ziv, ...
CHI
2007
ACM
14 years 5 months ago
FASTDash: a visual dashboard for fostering awareness in software teams
Software developers spend significant time gaining and maintaining awareness of fellow developers' activities. FASTDash is a new interactive visualization that seeks to impro...
Jacob T. Biehl, Mary Czerwinski, Greg Smith, Georg...