Sciweavers

3316 search results - page 142 / 664
» Mining Software Engineering Data
Sort
View
JNCA
2010
106views more  JNCA 2010»
15 years 4 days ago
A methodology for engineering collaborative and ad-hoc mobile applications using SyD middleware
Today’s web applications are more collaborative and are using the standard and ubiquitous Internet protocols. We have earlier developed System on Mobile Devices (SyD) middleware...
Praveen Madiraju, Srilaxmi Malladi, Janaka Balasoo...
FSTTCS
2000
Springer
15 years 5 months ago
Data Provenance: Some Basic Issues
The ease with which one can copy and transform data on the Web, has made it increasingly di cult to determine the origins of a piece of data. We use the term data provenance to ref...
Peter Buneman, Sanjeev Khanna, Wang Chiew Tan
125
Voted
AADEBUG
1997
Springer
15 years 5 months ago
Assertions for Dynamic Shape Analysis of List Data Structures
We introduce an assertion language for run-time checking of linked list data structure shapes. The assertion language is expressive enough to define characteristic predicates for ...
Mikhail Auguston, Miu Har Hon
QSIC
2006
IEEE
15 years 7 months ago
A Test Data Generation Tool for Unit Testing of C Programs
This paper describes a prototype tool, called SimC, which automatically generates test data for unit testing of C programs. The tool symbolically simulates the execution of the gi...
Zhongxing Xu, Jian Zhang
PPPJ
2003
ACM
15 years 7 months ago
A Java implemented key collision attack on the data encryption standard (DES)
A Java implementation of a key collision attack on DES suggested by Eli Biham, [1], is discussed. Storage space minimization and fast searching techniques to speed up the attack a...
John Loughran, Tom Dowling