Sciweavers

694 search results - page 43 / 139
» Comparison of software architecture reverse engineering meth...
Sort
View
115
Voted
CSSE
2004
IEEE
15 years 3 months ago
A comparison of modeling strategies in defining XML-based access control languages
One of the most important features of XML-based Web services is that they can be easily accessed over the Internet, but this makes them vulnerable to a series of security threats....
Claudio Agostino Ardagna, Sabrina De Capitani di V...
136
Voted
CSMR
2005
IEEE
15 years 9 months ago
Applying Webmining Techniques to Execution Traces to Support the Program Comprehension Process
Well-designed object-oriented programs typically consist of a few key classes that work tightly together to provide the bulk of the functionality. As such, these key classes are e...
Andy Zaidman, Toon Calders, Serge Demeyer, Jan Par...
KBSE
2003
IEEE
15 years 8 months ago
Unspeculation
Modern architectures, such as the Intel Itanium, support speculation, a hardware mechanism that allows the early execution of expensive operations—possibly even before it is kno...
Noah Snavely, Saumya K. Debray, Gregory R. Andrews
WCRE
2006
IEEE
15 years 9 months ago
On Computing the Canonical Features of Software Systems
Software applications typically have many features that vary in their similarity. We define a measurement of similarity between pairs of features based on their underlying implem...
Jay Kothari, Trip Denton, Spiros Mancoridis, Ali S...
WCRE
1996
IEEE
15 years 7 months ago
Finding Reusable Software Components in Large Systems
The extraction of reusable software components from existing systems is an attractive idea. The goal of the work in this paper is not to extract a component automatically, but to ...
James M. Neighbors