Sciweavers

694 search results - page 69 / 139
» Comparison of software architecture reverse engineering meth...
Sort
View
WCRE
2009
IEEE
15 years 10 months ago
Who are Source Code Contributors and How do they Change?
—Determining who are the copyright owners of a software system is important as they are the individuals and organizations that license the software to its users, and ultimately t...
Massimiliano Di Penta, Daniel M. Germán
WCRE
2003
IEEE
15 years 8 months ago
Problems Creating Task-relevant Clone Detection Reference Data
One prevalent method for evaluating the results of automated software analysis tools is to compare the tools’ output to the judgment of human experts. This evaluation strategy i...
Andrew Walenstein, Nitin Jyoti, Junwei Li, Yun Yan...
DAC
2006
ACM
16 years 4 months ago
Efficient detection and exploitation of infeasible paths for software timing analysis
Accurate estimation of the worst-case execution time (WCET) of a program is important for real-time embedded software. Static WCET estimation involves program path analysis and ar...
Vivy Suhendra, Tulika Mitra, Abhik Roychoudhury, T...
225
Voted
SEKE
2009
Springer
15 years 10 months ago
Resource Allocation for a Modular Software System
Most existing software optimization research assumes advance knowledge of the component parameters. Perfect future knowledge of fault detection is an unnecessary oversimplificati...
Lance Fiondella, Swapna S. Gokhale
118
Voted
CSSE
2008
IEEE
15 years 10 months ago
Study on Application of CAD Sonification
—The feedback of sonification on CAD analyzing information in addition to picture interface increases user’s accepting information and decreases the load of visual channel. Dat...
Zhang Yinnan, Cen Gang, Fang Zhigang