Sciweavers

ICSE
2007
IEEE-ACM
14 years 4 months ago
Automated Generation of Context-Aware Tests
The incorporation of context-awareness capabilities into pervasive applications allows them to leverage contextual information to provide additional services while maintaining an ...
Zhimin Wang, Sebastian G. Elbaum, David S. Rosenbl...
ICSE
2007
IEEE-ACM
14 years 4 months ago
Performance Evaluation and Prediction for Legacy Information Systems
Database-centric information systems are critical to the operations of large organisations. In particular, they often process a large amount of data with stringent performance req...
Yan Jin, Antony Tang, Jun Han, Yan Liu
ICSE
2007
IEEE-ACM
14 years 4 months ago
The Factory Pattern in API Design: A Usability Evaluation
Brian Ellis, Jeffrey Stylos, Brad A. Myers
ICSE
2007
IEEE-ACM
14 years 4 months ago
Ownership and Immutability Inference for UML-Based Object Access Control
We propose a mechanism for object access control which is based on the UML. Specifically, we propose use of ownership and immutability constraints on UML associations and verifica...
Yin Liu, Ana Milanova
ICSE
2007
IEEE-ACM
14 years 4 months ago
Behaviour Model Synthesis from Properties and Scenarios
Synthesis of behaviour models from software development artifacts such as scenario-based descriptions or requirements specifications not only helps significantly reduce the effort...
Greg Brunet, Marsha Chechik, Sebastián Uchi...
ICSE
2007
IEEE-ACM
14 years 4 months ago
SoQueT: Query-Based Documentation of Crosscutting Concerns
Marius Marin, Leon Moonen, Arie van Deursen
ICSE
2007
IEEE-ACM
14 years 4 months ago
Tracking Code Clones in Evolving Software
Code clones are generally considered harmful in software development, and the predominant approach is to try to eliminate them through refactoring. However, recent research has pr...
Ekwa Duala-Ekoko, Martin P. Robillard
ICSE
2007
IEEE-ACM
14 years 4 months ago
When Role Models Have Flaws: Static Validation of Enterprise Security Policies
Modern multiuser software systems have adopted RoleBased Access Control (RBAC) for authorization management. This paper presents a formal model for RBAC policy validation and a st...
Marco Pistoia, Stephen J. Fink, Robert J. Flynn, E...
ICSE
2007
IEEE-ACM
14 years 4 months ago
Revel8or: Model Driven Capacity Planning Tool Suite
Designing complex multi-tier applications that must meet strict performance requirements is a challenging software engineering problem. Ideally, the application architect could de...
Liming Zhu, Yan Liu, Ngoc Bao Bui, Ian Gorton