Sciweavers

69 search results - page 3 / 14
» Identifying refactoring opportunities by identifying depende...
Sort
View
QOSA
2009
Springer
13 years 12 months ago
Achieving Agility through Architecture Visibility
L.L.Bean is a large retail organization whose development processes must be agile in order to allow rapid enhancement and maintenance of its technology infrastructure. Over the pas...
Carl Hinsman, Neeraj Sangal, Judith A. Stafford
IWIA
2003
IEEE
13 years 10 months ago
Designing a Framework for Active Worm Detection on Global Networks
Past active Internet worms have caused widespread damage. Knowing the connection characteristics of such a worm very early in its proliferation cycle might provide first responde...
Vincent Berk, George Bakos, Robert Morris
PLDI
2006
ACM
13 years 11 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
BCS
2008
13 years 6 months ago
Tools for Traceable Security Verification
Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as one of the current grand challenges for computer science. We present work toward...
Jan Jürjens, Yijun Yu, Andreas Bauer 0002
ICSE
2010
IEEE-ACM
13 years 2 months ago
Capturing the long-term impact of changes
Developers change source code to add new functionality, fix bugs, or refactor their code. Many of these changes have immediate impact on quality or stability. However, some impact...
Kim Sebastian Herzig