Sciweavers

TSE
2008
103views more  TSE 2008»
13 years 4 months ago
A Realistic Empirical Evaluation of the Costs and Benefits of UML in Software Maintenance
The Unified Modeling Language (UML) is the de facto standard for object-oriented software analysis and design modeling. However, few empirical studies exist which investigate the c...
Wojciech J. Dzidek, Erik Arisholm, Lionel C. Brian...
TSE
2008
111views more  TSE 2008»
13 years 4 months ago
Effective Software Merging in the Presence of Object-Oriented Refactorings
Current text based Software Configuration Management (SCM) systems have trouble with refactorings. Refactorings result in global changes which lead to merge conflicts. A refactorin...
Danny Dig, Kashif Manzoor, Ralph E. Johnson, Tien ...
TSE
2008
113views more  TSE 2008»
13 years 4 months ago
Discovering Neglected Conditions in Software by Mining Dependence Graphs
Neglected conditions are an important but difficult-to-find class of software defects. This paper presents a novel approach for revealing neglected conditions that integrates stati...
Ray-Yaung Chang, Andy Podgurski, Jiong Yang
TSE
2008
129views more  TSE 2008»
13 years 4 months ago
Classifying Software Changes: Clean or Buggy?
This paper introduces a new technique for predicting latent software bugs, called change classification. Change classification uses a machine learning classifier to determine wheth...
Sunghun Kim, E. James Whitehead Jr., Yi Zhang 0001
TSE
2008
99views more  TSE 2008»
13 years 4 months ago
Modular Information Hiding and Type-Safe Linking for C
This paper presents CMOD, a novel tool that provides a sound module system for C. CMOD works by enforcing a set of four rules that are based on principles of modular reasoning and...
Saurabh Srivastava, Michael Hicks, Jeffrey S. Fost...
TSE
2008
128views more  TSE 2008»
13 years 4 months ago
Analyzing Regulatory Rules for Privacy and Security Requirements
Information practices that use personal, financial, and health-related information are governed by US laws and regulations to prevent unauthorized use and disclosure. To ensure com...
Travis D. Breaux, Annie I. Antón
TSE
2008
98views more  TSE 2008»
13 years 4 months ago
Software Architecture Visualization: An Evaluation Framework and Its Application
In order to characterize and improve software architecture visualization practice, the paper derives and constructs a qualitative framework, with seven key areas and 31 features, f...
Keith Gallagher, Andrew Hatch, Malcolm Munro
TSE
2008
118views more  TSE 2008»
13 years 4 months ago
Semantics-Based Design for Secure Web Services
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
TSE
2008
236views more  TSE 2008»
13 years 4 months ago
Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies
Web applications are widely adopted and their correct functioning is mission critical for many businesses. At the same time, Web applications tend to be error prone and implementat...
Lieven Desmet, Pierre Verbaeten, Wouter Joosen, Fr...
TSE
2008
92views more  TSE 2008»
13 years 4 months ago
Metrics for Measuring the Quality of Modularization of Large-Scale Object-Oriented Software
The metrics formulated to date for characterizing the modularization quality of object-oriented software have considered module and class to be synonymous concepts. But, a typical ...
Santonu Sarkar, Avinash C. Kak, Girish Maskeri Ram...