Sciweavers

230 search results - page 25 / 46
» An Empirical Study into Use of Dependency Injection in Java
Sort
View
CC
2006
Springer
122views System Software» more  CC 2006»
15 years 5 months ago
Context-Sensitive Points-to Analysis: Is It Worth It?
We present the results of an empirical study evaluating the precision of subset-based points-to analysis with several variations of context sensitivity on Java benchmarks of signif...
Ondrej Lhoták, Laurie J. Hendren
JCDL
2006
ACM
99views Education» more  JCDL 2006»
15 years 7 months ago
Using resources across educational digital libraries
This article reports on analyses of usage and design activities by users of the Instructional Architect (IA), an end-user authoring tool designed to support easy access to and use...
Mimi Recker, Bart Palmer
ICSE
2009
IEEE-ACM
14 years 11 months ago
Security Test Generation Using Threat Trees
Software security issues have been a major concern to the cyberspace community, so a great deal of research on security testing has been performed, and various security testing te...
Aaron Marback, Hyunsook Do, Ke He, Samuel Kondamar...
IWPC
2010
IEEE
14 years 11 months ago
Understanding and Auditing the Licensing of Open Source Software Distributions
—Free and open source software (FOSS) is often distributed in binary packages, sometimes part of GNU/Linux operating system distributions, or part of products distributed/sold to...
Daniel M. Germán, Massimiliano Di Penta, Ju...
AINA
2008
IEEE
15 years 7 months ago
Service-Orientation and Flexible Service Binding in Distributed Automation and Control Systems
An experimental study shows the feasibility of service-oriented architectures for industrial automation and control systems even with respect to lower, real-time dependent control...
Andre Pohl, Heiko Krumm, Felix Holland, Franz-Jose...