Sciweavers

24 search results - page 3 / 5
» scam 2007
Sort
View
SCAM
2007
IEEE
13 years 11 months ago
Toward an Implementation of the "Form Template Method" Refactoring
This paper presents an implementation of the “form template method” refactoring. This transformation has not been automated yet, but has many similarities with other transform...
Nicolas Juillerat, Béat Hirsbrunner
SCAM
2007
IEEE
13 years 11 months ago
SQuAVisiT: A Software Quality Assessment and Visualisation Toolset
Software quality assessment of large COBOL industrial legacy systems, both for maintenance or migration purposes, mounts a serious challenge. We present the Software Quality Asses...
Serguei A. Roubtsov, Alexandru Telea, Danny Holten
SCAM
2007
IEEE
13 years 11 months ago
Finding Inputs that Reach a Target Expression
We present an automated program analysis, called Reach, to compute program inputs that cause evaluation of explicitly-marked target expressions. Reach has a range of applications ...
Matthew Naylor, Colin Runciman
SCAM
2007
IEEE
13 years 11 months ago
Barrier Slicing for Remote Software Trusting
Remote trusting aims at verifying the “healthy” execution of a program running on an untrusted client that communicates with a trusted server via network connection. After giv...
Mariano Ceccato, Mila Dalla Preda, Jasvir Nagra, C...
SCAM
2007
IEEE
13 years 11 months ago
The Programmer's Lexicon, Volume I: The Verbs
ames make or break abstractions: good ones communicate the intention of the method, whereas bad ones cause confusion and frustration. The task of naming is subject to the whims an...
Einar W. Høst, Bjarte M. Østvold