Sciweavers

686 search results - page 86 / 138
» Empirical Studies in Reverse Engineering
Sort
View
INFSOF
2008
85views more  INFSOF 2008»
14 years 9 months ago
Locating dependence structures using search-based slicing
This paper introduces an approach to locating dependence structures in a program by searching the space of the powerset of the set of all possible program slices. The paper formul...
Tao Jiang, Nicolas Gold, Mark Harman, Zheng Li
PROFES
2009
Springer
15 years 2 months ago
Value Creation by Agile Projects: Methodology or Mystery?
Business value is a key concept in agile software development approaches. This paper presents results of a systematic review of literature on how business value is created by agile...
Zornitza Racheva, Maya Daneva, Klaas Sikkel
SCAM
2008
IEEE
15 years 4 months ago
Constructing Subtle Faults Using Higher Order Mutation Testing
Traditional mutation testing considers only first order mutants, created by the injection of a single fault. Often these first order mutants denote trivial faults that are easil...
Yue Jia, Mark Harman
SCAM
2008
IEEE
15 years 4 months ago
The Evolution and Decay of Statically Detected Source Code Vulnerabilities
The presence of vulnerable statements in the source code is a crucial problem for maintainers: properly monitoring and, if necessary, removing them is highly desirable to ensure h...
Massimiliano Di Penta, Luigi Cerulo, Lerina Aversa...
XPU
2007
Springer
15 years 4 months ago
Usability in Agile Software Development: Extending the Interaction Design Process with Personas Approach
The current agile software development methods do not seem to address usability and interaction design issues enough, i.e., the interaction design process may remain implicit. Howe...
Jukka Haikara