Sciweavers

533 search results - page 107 / 107
» Verification of Distributed Firewalls
Sort
View
SIGSOFT
2010
ACM
13 years 2 months ago
Differential static analysis: opportunities, applications, and challenges
It is widely believed that program analysis can be more closely targeted to the needs of programmers if the program is accompanied by further redundant documentation. This may inc...
Shuvendu K. Lahiri, Kapil Vaswani, C. A. R. Hoare
SIGSOFT
2010
ACM
13 years 2 months ago
The missing links: bugs and bug-fix commits
Empirical studies of software defects rely on links between bug databases and program code repositories. This linkage is typically based on bug-fixes identified in developer-enter...
Adrian Bachmann, Christian Bird, Foyzur Rahman, Pr...
ATAL
2011
Springer
12 years 4 months ago
The effect of expression of anger and happiness in computer agents on negotiations with humans
There is now considerable evidence in social psychology, economics, and related disciplines that emotion plays an important role in negotiation. For example, humans make greater c...
Celso M. de Melo, Peter Carnevale, Jonathan Gratch