Sciweavers

694 search results - page 46 / 139
» Comparison of software architecture reverse engineering meth...
Sort
View
APSEC
2000
IEEE
15 years 7 months ago
Service-based software: the future for flexible software
For the past 40 years, the techniques, processes and methods of software development have been dominated by supply-side issues, giving rise to a software industry oriented towards...
Keith H. Bennett, Paul J. Layzell, David Budgen, P...
ICCD
2007
IEEE
140views Hardware» more  ICCD 2007»
16 years 7 days ago
A low overhead hardware technique for software integrity and confidentiality
Software integrity and confidentiality play a central role in making embedded computer systems resilient to various malicious actions, such as software attacks; probing and tamper...
Austin Rogers, Milena Milenkovic, Aleksandar Milen...
WCRE
2003
IEEE
15 years 8 months ago
Revealing Class Structure with Concept Lattices
This paper promotes the use of a mathematical concept lattice based upon the binary relation of accesses between methods and fields as a novel visualization of individual JAVA cl...
Uri Dekel, Yossi Gil
170
Voted
CSSE
2008
IEEE
15 years 9 months ago
Web Services Composition Method Based on OWL
—At present, Web services are created and updated on the fly. It has already beyond the human ability to analysis them and generate the composition plan manually. It is a problem...
Jike Ge, Yuhui Qiu, Shiqun Yin
MSR
2011
ACM
14 years 6 months ago
An empirical analysis of the FixCache algorithm
The FixCache algorithm, introduced in 2007, effectively identifies files or methods which are likely to contain bugs by analyzing source control repository history. However, many ...
Caitlin Sadowski, Chris Lewis 0002, Zhongpeng Lin,...