Sciweavers

3657 search results - page 174 / 732
» A Study of Practical Deduplication
Sort
View
79
Voted
CSFW
2006
IEEE
15 years 4 months ago
Noninterference in the Presence of Non-Opaque Pointers
A common theoretical assumption in the study of information flow security in Java-like languages is that pointers are opaque – i.e., that the only properties that can be observ...
Daniel Hedin, David Sands
79
Voted
ICSM
2006
IEEE
15 years 4 months ago
Guiding the Application of Design Patterns Based on UML Models
Software design patterns are documented best practice solutions that can be applied to reoccurring problems. Although well documented, there are often opportunities to apply them ...
Lionel C. Briand, Yvan Labiche, Alexandre Sauve
82
Voted
TAICPART
2006
IEEE
15 years 4 months ago
On the Testing Maturity of Software Producing Organizations
This paper presents data from a study of the current state of practice of software testing. Test managers from twelve different software organizations were interviewed. The interv...
Mats Grindal, Jeff Offutt, Jonas Mellin
CSMR
2005
IEEE
15 years 3 months ago
Discovering Unanticipated Dependency Schemas in Class Hierarchies
Object-oriented applications are difficult to extend and maintain, due to the presence of implicit dependencies in the inheritance hierarchy. Although these dependencies often co...
Gabriela Arévalo, Stéphane Ducasse, ...
HICSS
2005
IEEE
114views Biometrics» more  HICSS 2005»
15 years 3 months ago
Boundary-Spanning Knowledge-Sharing In E-Collaboration
Knowledge creation and sharing in organizations is most often assumed to involve direct interactions. It is true that the creation of shared knowledge is really only feasible when...
Susan Gasson