Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
TSE
2008
76views more  TSE 2008»
11 years 5 months ago
Static Specification Mining Using Automata-Based Abstractions
Sharon Shoham, Eran Yahav, Stephen J. Fink, Marco ...
TSE
2008
96views more  TSE 2008»
11 years 5 months ago
Model-Based Adaptation of Behavioral Mismatching Components
Carlos Canal, Pascal Poizat, Gwen Salaün
TSE
2008
131views more  TSE 2008»
11 years 6 months ago
Enhancing an Application Server to Support Available Components
Three-tier middleware architecture is commonly used for hosting enterprise-distributed applications. Typically, the application is decomposed into three layers: front end, middle t...
Achmad I. Kistijantoro, Graham Morgan, Santosh K. ...
TSE
2008
165views more  TSE 2008»
11 years 6 months ago
A Systematic Study of Failure Proximity
Software end users are the best testers, who keep revealing bugs in software that has undergone rigorous in-house testing. In order to leverage their testing efforts, failure repor...
Chao Liu 0001, Xiangyu Zhang, Jiawei Han
TSE
2008
103views more  TSE 2008»
11 years 6 months ago
The Impact of Educational Background on the Effectiveness of Requirements Inspections: An Empirical Study
While the inspection of various software artifacts increases the quality of the end product, the effectiveness of an inspection largely depends on the individual inspectors involve...
Jeffrey C. Carver, Nachiappan Nagappan, Alan Page
TSE
2008
107views more  TSE 2008»
11 years 6 months ago
Interface Grammars for Modular Software Model Checking
We propose an interface specification language based on grammars for modular software model checking. In our interface specification language, component interfaces are specified a...
Graham Hughes, Tevfik Bultan
TSE
2008
92views more  TSE 2008»
11 years 6 months ago
Evaluating Test Suites and Adequacy Criteria Using Simulation-Based Models of Distributed Systems
Test adequacy criteria provide the engineer with guidance on how to populate test suites. While adequacy criteria have long been a focus of research, existing testing methods do no...
Matthew J. Rutherford, Antonio Carzaniga, Alexande...
TSE
2008
115views more  TSE 2008»
11 years 6 months ago
Do Crosscutting Concerns Cause Defects?
There is a growing consensus that crosscutting concerns harm code quality. An example of a crosscutting concern is a functional requirement whose implementation is distributed acro...
Marc Eaddy, Thomas Zimmermann, Kaitin D. Sherwood,...
TSE
2008
97views more  TSE 2008»
11 years 6 months ago
Timed Automata Patterns
Timed Automata have proven to be useful for specification and verification of real-time systems. System design using Timed Automata relies on explicit manipulation of clock variabl...
Jin Song Dong, Ping Hao, Shengchao Qin, Jun Sun 00...
TSE
2008
89views more  TSE 2008»
11 years 6 months ago
WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation
Many software systems have evolved to include a Web-based component that makes them available to the public via the Internet and can expose them to a variety of Web-based attacks. ...
William G. J. Halfond, Alessandro Orso, Pete Manol...
books