Sciweavers

2212 search results - page 47 / 443
» Automated software wrapping
Sort
View
ICCAD
2000
IEEE
124views Hardware» more  ICCAD 2000»
15 years 3 months ago
A Methodology for Verifying Memory Access Protocols in Behavioral Synthesis
— Memory is one of the most important components to be optimized in the several phases of the synthesis process. ioral synthesis, a memory is viewed as an abstract construct whic...
Gernot Koch, Taewhan Kim, Reiner Genevriere
SEBD
2008
178views Database» more  SEBD 2008»
15 years 24 days ago
A New Generation Search Engine Supporting Cross Domain Queries
d Abstract) Daniele Braga1 , Diego Calvanese2 , Alessandro Campi1 , Stefano Ceri1 , Florian Daniel1 , Davide Martinenghi1 , Paolo Merialdo3 , Riccardo Torlone3 1 Dip. di Elettronic...
Daniele Braga, Diego Calvanese, Alessandro Campi, ...
ECOOP
2007
Springer
15 years 3 months ago
Automating Feature-Oriented Refactoring of Legacy Applications
Creating a software product line from a legacy application is a difficult task. We propose a tool that helps automating tedious tasks of refactoring legacy applications into featu...
Christian Kästner, Martin Kuhlemann, Don S. B...
SAC
2008
ACM
14 years 11 months ago
Automated classification of change messages in open source projects
Source control systems permit developers to attach a free form message to every committed change. The content of these change messages can support software maintenance activities....
Ahmed E. Hassan
ISSTA
2010
ACM
15 years 3 months ago
Automated fixing of programs with contracts
In program debugging, finding a failing run is only the first step; what about correcting the fault? Can we automate the second task as well as the first? The AutoFix-E tool au...
Yi Wei, Yu Pei, Carlo A. Furia, Lucas S. Silva, St...