Sciweavers

4790 search results - page 488 / 958
» Reverse Query Processing
Sort
View
157
Voted
SP
2006
IEEE
102views Security Privacy» more  SP 2006»
15 years 11 months ago
Secure Device Pairing based on a Visual Channel (Short Paper)
Recently several researchers and practitioners have begun to address the problem of how to set up secure communication between two devices without the assistance of a trusted thir...
Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N...
WCRE
2006
IEEE
15 years 11 months ago
An Industrial Case Study of Program Artifacts Viewed During Maintenance Tasks
Research on maintenance task structure modeling has so far examined only how often program artifacts are modified, and what information can be deduced from modification records....
Lijie Zou, Michael W. Godfrey
AFRIGRAPH
2006
ACM
15 years 11 months ago
Free-form modelling for surface inpainting
In this paper, we describe a novel approach to 3D shape modelling, targeting at the reconstruction and repair of digitised models – a task that is frequently encountered in part...
Gerhard H. Bendels, Michael Guthe, Reinhard Klein
SIGSOFT
2006
ACM
15 years 11 months ago
Detecting increases in feature coupling using regression tests
Repeated changes to a software system can introduce small weaknesses such as unplanned dependencies between different parts of the system. While such problems usually go undetecte...
Olivier Giroux, Martin P. Robillard
WCRE
2005
IEEE
15 years 10 months ago
Diagnosing Design Problems in Object Oriented Systems
Software decay is a phenomenon that plagues aging software systems. While in recent years, there has been significant progress in the area of automatic detection of “code smells...
Adrian Trifu, Radu Marinescu