Sciweavers

2132 search results - page 251 / 427
» Automated software winnowing
Sort
View
BPM
2008
Springer
134views Business» more  BPM 2008»
15 years 7 months ago
Digital Identity and Reputation in the Context of a Bounded Social Ecosystem
This paper highlights the problem of digital identity, or cross-set unique identifying tokens, inherent in the application of social software in business processes. As social softw...
Ben Jennings, Anthony Finkelstein
144
Voted
CISIS
2008
IEEE
15 years 7 months ago
Multi-variant Program Execution: Using Multi-core Systems to Defuse Buffer-Overflow Vulnerabilities
While memory-safe and type-safe languages have been available for many years, the vast majority of software is still implemented in type-unsafe languages such as C/C++. Despite ma...
Babak Salamat, Andreas Gal, Todd Jackson, Karthike...
DAGSTUHL
2004
15 years 6 months ago
Testing with Functions as Specifications
Although computer systems penetrate all facets of society, the software running those systems may contain many errors. Producing high quality software appears to be difficult and v...
Pieter W. M. Koopman
142
Voted
ENTCS
2007
108views more  ENTCS 2007»
15 years 5 months ago
An Adaptation-based Approach to Incrementally Build Component Systems
Software components are now widely used in the development of systems. However, incompatibilities between their behavioural interfaces may make their composition impossible. The o...
Pascal Poizat, Gwen Salaün, Massimo Tivoli
WCRE
2010
IEEE
15 years 3 months ago
Mining Source Code for Structural Regularities
Abstract—During software development, design rules and contracts in the source code are often encoded through regularities, such as API usage protocols, coding idioms and naming ...
Angela Lozano, Andy Kellens, Kim Mens, Gabriela Ar...