Sciweavers

618 search results - page 101 / 124
» A Practical Program Transformation System for Reverse Engine...
Sort
View
ICSM
1997
IEEE
15 years 7 months ago
Software Change Through Design Maintenance
Conventional software engineering tends to focus on a small part of the software life cycle: the design and implementation of a product. The bulk of the lifetime cost is in the ma...
Ira D. Baxter, Christopher Pidgeon
142
Voted
ICSM
2002
IEEE
15 years 8 months ago
Restructuring Multilingual Web Sites
Current practice of Web site development does not address explicitly the problems related to multilingual sites. The same information, as well as the same navigation paths, page f...
Paolo Tonella, Filippo Ricca, Emanuele Pianta, Chr...
ASE
2008
120views more  ASE 2008»
15 years 3 months ago
Requirements model generation to support requirements elicitation: the Secure Tropos experience
In the last years several efforts have been devoted by researchers in the Requirements Engineering community to the development of methodologies for supporting designers during req...
Nadzeya Kiyavitskaya, Nicola Zannone
143
Voted
SIGSOFT
2003
ACM
16 years 4 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler
EDBT
2009
ACM
135views Database» more  EDBT 2009»
15 years 7 months ago
Provenance for nested subqueries
Data provenance is essential in applications such as scientific computing, curated databases, and data warehouses. Several systems have been developed that provide provenance fun...
Boris Glavic, Gustavo Alonso