Sciweavers

3316 search results - page 266 / 664
» Mining Software Engineering Data
Sort
View
190
Voted
ICSE
2012
IEEE-ACM
13 years 6 months ago
Continuous social screencasting to facilitate software tool discovery
—The wide variety of software development tools available today have a great potential to improve the way developers make software, but that potential goes unfulfilled when deve...
Emerson R. Murphy-Hill
122
Voted
SCAM
2006
IEEE
15 years 9 months ago
Evaluating C++ Design Pattern Miner Tools
Many articles and tools have been proposed over the years for mining design patterns from source code. These tools differ in several aspects, thus their fair comparison is hard. B...
Lajos Jeno Fülöp, Tamas Gyovai, Rudolf F...
CCS
2004
ACM
15 years 9 months ago
MAC and UML for secure software design
Security must be a first class citizen in the design of large scale, interacting, software applications, at early and all stages of the lifecycle, for accurate and precise policy ...
Thuong Doan, Steven A. Demurjian, T. C. Ting, Andr...
142
Voted
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 7 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
136
Voted
ISPW
1996
IEEE
15 years 7 months ago
Feedback, evolution and software technology
A 1968 study of the software process led, inter alia, to the observation that the software process constitutes a feedback system. Attempts at its management and improvement must t...
M. M. Lehman