Sciweavers

569 search results - page 52 / 114
» Intent Specifications: An Approach to Building Human-Centere...
Sort
View
WCRE
1999
IEEE
15 years 4 months ago
Reusing Domains for the Construction of Reverse Engineering Tools
One of the challenges of reverse engineering is the extraction of a specification from source code. Our work proposes a singular approach to the construction of reverse engineerin...
Felipe Gouveia de Freitas, Julio Cesar Sampaio do ...
JUCS
2006
92views more  JUCS 2006»
14 years 11 months ago
Program Slicing by Calculation
: Program slicing is a well known family of techniques used to identify code fragments which depend on or are depended upon specific program entities. They are particularly useful ...
Nuno F. Rodrigues, Luís Soares Barbosa
AOSD
2009
ACM
15 years 3 months ago
Semantic vs. syntactic compositions in aspect-oriented requirements engineering: an empirical study
Most current aspect composition mechanisms rely on syntactic references to the base modules or wildcard mechanisms quantifying over such syntactic references in pointcut expressio...
Ruzanna Chitchyan, Phil Greenwood, Américo ...
SDM
2010
SIAM
256views Data Mining» more  SDM 2010»
15 years 1 months ago
The Application of Statistical Relational Learning to a Database of Criminal and Terrorist Activity
We apply statistical relational learning to a database of criminal and terrorist activity to predict attributes and event outcomes. The database stems from a collection of news ar...
B. Delaney, Andrew S. Fast, W. M. Campbell, C. J. ...
SEMWEB
2004
Springer
15 years 5 months ago
An Initial Investigation into Querying an Untrustworthy and Inconsistent Web
The Semantic Web is bound to be untrustworthy and inconsistent. In this paper, we present an initial approach for obtaining useful information in such an environment. In particular...
Yuanbo Guo, Jeff Heflin