Sciweavers

139 search results - page 14 / 28
» Analyzing Empirical Data from a Reverse Engineering Project
Sort
View
AISC
2010
Springer
15 years 2 months ago
Dimensions of Formality: A Case Study for MKM in Software Engineering
Abstract. We study the formalization process of a collection of documents created for a Software Engineering project from an MKM perspective. We analyze how document and collection...
Andrea Kohlhase, Michael Kohlhase, Christoph Lange...
ISSRE
2005
IEEE
15 years 3 months ago
Helping End-Users "Engineer" Dependable Web Applications
End-user programmers are increasingly relying on web authoring environments to create web applications. Although often consisting primarily of web pages, such applications are inc...
Sebastian G. Elbaum, Kalyan-Ram Chilakamarri, Bhuv...
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 1 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
SEAA
2008
IEEE
15 years 4 months ago
Evaluating RUP Software Development Processes Through Visualization of Effort Distribution
In this exploratory case study, effort distribution visualizations of industrial software development projects are made in order to assess to what extent patterns can be found tha...
Werner Heijstek, Michel R. V. Chaudron
CSMR
2006
IEEE
15 years 3 months ago
Package Patterns for Visual Architecture Recovery
Recovering the architecture is the first step towards reengineering a software system. Many reverse engineering tools use top-down exploration as a way of providing a visual and ...
Mircea Lungu, Michele Lanza, Tudor Gîrba