Sciweavers

4919 search results - page 760 / 984
» A Process-Ontological Model for Software Engineering
Sort
View
110
Voted
SIGSOFT
2008
ACM
16 years 4 months ago
Effective blame for information-flow violations
Programs trusted with secure information should not release that information in ways contrary to system policy. However, when a program contains an illegal flow of information, cu...
Dave King 0002, Trent Jaeger, Somesh Jha, Sanjit A...
107
Voted
ICSE
2003
IEEE-ACM
16 years 3 months ago
Cost Estimation for Web Applications
In this paper, we investigate the application of the COBRATM method (Cost Estimation, Benchmarking, and Risk Assessment) in a new application domain, the area of web development. ...
Melanie Ruhe, D. Ross Jeffery, Isabella Wieczorek
141
Voted
ICSE
2004
IEEE-ACM
16 years 3 months ago
Finding Latent Code Errors via Machine Learning over Program Executions
This paper proposes a technique for identifying program properties that indicate errors. The technique generates machine learning models of program properties known to result from...
Yuriy Brun, Michael D. Ernst
132
Voted
ICSE
2004
IEEE-ACM
16 years 3 months ago
An Experimental, Pluggable Infrastructure for Modular Configuration Management Policy Composition
Building a configuration management (CM) system is a difficult endeavor that regularly requires tens of thousands of lines of code to be written. To reduce this effort, several ex...
Ronald van der Lingen, André van der Hoek
219
Voted
ICSE
2004
IEEE-ACM
16 years 3 months ago
Toward Undoing in Composite Web Services
Cancelling or reversing the effect of a former action is a necessity in most interactive systems. The simplest and most frequent form of this facility is the "undo" comma...
Marie-Claude Gaudel