Sciweavers

1689 search results - page 177 / 338
» Empirical Methodologies in Software Engineering
Sort
View
SAC
2009
ACM
15 years 8 months ago
Remote software protection by orthogonal client replacement
In a typical client-server scenario, a trusted server provides valuable services to a client, which runs remotely on an untrusted platform. Of the many security vulnerabilities th...
Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, ...
HICSS
2000
IEEE
135views Biometrics» more  HICSS 2000»
15 years 6 months ago
The IT Performance Evaluation in the Construction Industry
To date there has been limited published work in the construction management and engineering literature that has provided empirical evidence to demonstrate that IT can improve org...
Heng Li, Zahir Irani, Peter E. D. Love
PEPM
2009
ACM
15 years 10 months ago
Guided model checking for programs with polymorphism
Exhaustive model checking search techniques are ineffective for error discovery in large and complex multi-threaded software systems. Distance estimate heuristics guide the concre...
Neha Rungta, Eric G. Mercer
SCAM
2007
IEEE
15 years 8 months ago
Relating the Evolution of Design Patterns and Crosscutting Concerns
Crosscutting concerns consist in software system features having the implementation spread across modules as tangled and scattered code. In many cases, these crosscutting concerns...
Lerina Aversano, Luigi Cerulo, Massimiliano Di Pen...
WCRE
2007
IEEE
15 years 8 months ago
A Study of Consistent and Inconsistent Changes to Code Clones
Code Cloning is regarded as a threat to software maintenance, because it is generally assumed that a change to a code clone usually has to be applied to the other clones of the cl...
Jens Krinke