Sciweavers

3316 search results - page 367 / 664
» Mining Software Engineering Data
Sort
View
ISESE
2003
IEEE
15 years 8 months ago
Composable Process Elements for Developing COTS-Based Applications
Data collected from five years of developing e-service applications at USC-CSE reveals that an increasing fraction have been commercial-off-the-shelf (COTS)Based Application (CBA)...
Barry W. Boehm, Daniel Port, Ye Yang, Jesal Bhuta,...
ISSRE
2003
IEEE
15 years 8 months ago
Early Warning of Failures through Alarm Analysis - A Case Study in Telecom Voice Mail Systems
-- This paper presents three principles for alarm analysis to develop early warnings of failure. The concepts are illustrated with real data and experience drawn from Comverse Voic...
Dorron Levy, Ram Chillarege
ICFEM
2003
Springer
15 years 8 months ago
A Z Based Approach to Verifying Security Protocols
Abstract. Security protocols preserve essential properties, such as confidentiality and authentication, of electronically transmitted data. However, such properties cannot be dire...
Benjamin W. Long, Colin J. Fidge, Antonio Cerone
WCRE
2007
IEEE
15 years 9 months ago
Discovering the Objectual Meaning of Foreign Key Constraints in Enterprise Applications
The software industry is increasingly confronted with the issues of understanding and maintaining a special type of object-oriented systems, namely enterprise applications. A spec...
Cristina Marinescu
WWW
2010
ACM
15 years 8 months ago
Redundancy detection in service-oriented systems
This paper addresses the problem of identifying redundant data in large-scale service-oriented information systems. Specifically, the paper puts forward an automated method to pi...
Peep Küngas, Marlon Dumas