Sciweavers

3316 search results - page 470 / 664
» Mining Software Engineering Data
Sort
View
GPCE
2007
Springer
15 years 8 months ago
A type-centric framework for specifying heterogeneous, large-scale, component-oriented, architectures
Maintaining integrity, consistency, and enforcing conformance in architectures of large-scale systems requires specification and enforcement of many different forms of structural...
Georg Jung, John Hatcliff
SEKE
2007
Springer
15 years 8 months ago
Adjudicator: A Statistical Approach for Learning Ontology Concepts from Peer Agents
— We present a statistical approach for software agents to learn ontology concepts from peer agents by asking them whether they can reach consensus on significant differences bet...
Behrouz Homayoun Far, Abdel Halim Elamy, Nora Houa...
ICCS
2004
Springer
15 years 7 months ago
Improving Generalization Level in UML Models Iterative Cross Generalization in Practice
FCA has been successfully applied to software engineering tasks such as source code analysis and class hierarchy re-organization. Most notably, FCA hematics behind the mechanism of...
Michel Dao, Marianne Huchard, Mohamed Rouane Hacen...
ISSRE
2003
IEEE
15 years 7 months ago
Exploiting Symmetries to Test Programs
Symmetries often appear as properties of many artifical settings. In Program Testing, they can be viewed as properties of programs and can be given by the tester to check the cor...
Arnaud Gotlieb
SP
2010
IEEE
140views Security Privacy» more  SP 2010»
15 years 5 months ago
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries
Abstract—Unfortunately, malicious software is still an unsolved problem and a major threat on the Internet. An important component in the fight against malicious software is the...
Clemens Kolbitsch, Thorsten Holz, Christopher Krue...