Sciweavers

2236 search results - page 358 / 448
» Secure Software Design in Practice
Sort
View
ICSE
2005
IEEE-ACM
15 years 10 months ago
Use of relative code churn measures to predict system defect density
Software systems evolve over time due to changes in requirements, optimization of code, fixes for security and reliability bugs etc. Code churn, which measures the changes made to...
Nachiappan Nagappan, Thomas Ball
SIGCSE
2009
ACM
194views Education» more  SIGCSE 2009»
15 years 10 months ago
Integrating pedagogical code reviews into a CS 1 course: an empirical study
Formal code inspections are employed by teams of professional software engineers to identify software defects and improve the quality of software. After reviewing a piece of code ...
Christopher D. Hundhausen, Anukrati Agrawal, Dana ...
CPM
1998
Springer
209views Combinatorics» more  CPM 1998»
15 years 2 months ago
A Fast Bit-Vector Algorithm for Approximate String Matching Based on Dynamic Programming
The approximate string matching problem is to find all locations at which a query of length m matches a substring of a text of length n with k-or-fewer differences. Simple and prac...
Gene Myers
SIGCSE
2010
ACM
169views Education» more  SIGCSE 2010»
15 years 4 months ago
Interfaces first (and foremost) with Java
ion is a critical concept that underlies many topics in computing science. For example, in software engineering, the distinction between a component’s behavior and its implement...
Paolo A. G. Sivilotti, Matthew Lang
TEI
2010
ACM
135views Hardware» more  TEI 2010»
15 years 4 months ago
Hands and fingers: a mobile platform for a person-centric network of computational objects
We describe a practical vision of ubiquitous computing with tangible interfaces, that orbits around an individual and is mediated by his or her personal consumer electronic device...
John Kestner, Henry Holtzman