Sciweavers

46 search results - page 3 / 10
» The Information Gathering Strategies of Software Maintainers
Sort
View
ICONIP
2009
13 years 2 months ago
Automated Log Analysis of Infected Windows OS Using Mechanized Reasoning
Malware (Malicious Software) of Windows OS has become more sophisticated. To take some countermeasures for recent infection, more intelligent and automated system log analysis is n...
Ruo Ando
GRAPHICSINTERFACE
2003
13 years 6 months ago
Finding Things In Fisheyes: Memorability in Distorted Spaces
Interactive fisheye views use distortion to show both local detail and global context in the same display space. Although fisheyes allow the presentation and inspection of large d...
Amy Skopik, Carl Gutwin
ICSM
2007
IEEE
13 years 11 months ago
Design recovery and maintenance of build systems
The build system forms an indispensable part of any software project. It needs to evolve in parallel with the source code in order to build, test and install the software. Unfortu...
Bram Adams, Herman Tromp, Kris De Schutter, Wolfga...
ICSE
2008
IEEE-ACM
14 years 5 months ago
An approach to detecting duplicate bug reports using natural language and execution information
An open source project typically maintains an open bug repository so that bug reports from all over the world can be gathered. When a new bug report is submitted to the repository...
Xiaoyin Wang, Lu Zhang, Tao Xie, John Anvik, Jiasu...
CASCON
1997
98views Education» more  CASCON 1997»
13 years 6 months ago
Similarity-based retrieval for diverse bookshelf software repository users
The paper presents a similarity-based retrieval framework for a software repository that aids the process of maintaining, understanding, and migrating legacy software systems [12]...
Igor Jurisica