Sciweavers

1575 search results - page 134 / 315
» Simultaneous Source Location
Sort
View
152
Voted
SEKE
2005
Springer
15 years 9 months ago
Using Feature-Oriented Analysis to Recover Legacy Software Design for Software Evolution
Most design recovery approaches start from analysing source code. Nonetheless, it is very difficult to get adequate design information only depending on source code. Additional av...
Shaoyun Li, Feng Chen, Zhihong Liang, Hongji Yang
108
Voted
GECCO
2004
Springer
15 years 8 months ago
Using Interconnection Style Rules to Infer Software Architecture Relations
Software design techniques emphasize the use of abstractions to help developers deal with the complexity of constructing large and complex systems. These abstractions can also be u...
Brian S. Mitchell, Spiros Mancoridis, Martin Trave...
LCN
2003
IEEE
15 years 8 months ago
New Metrics for Dominating Set Based Energy Efficient Activity Scheduling in Ad Hoc Networks
In a multi-hop wireless network, each node is able to send a message to all of its neighbors that are located within its transmission radius. In a flooding task, a source sends th...
Jamil A. Shaikh, Julio Solano-González, Iva...
131
Voted
CC
2003
Springer
120views System Software» more  CC 2003»
15 years 8 months ago
Run-Time Type Checking for Binary Programs
Abstract. Many important software systems are written in the C programming language. Unfortunately, the C language does not provide strong safety guarantees, and many common progra...
Michael Burrows, Stephen N. Freund, Janet L. Wiene...
CAISE
2000
Springer
15 years 7 months ago
CHAOS: An Active Security Mediation System
With the emergence of the Internet, collaborative computing has become more feasible than ever. Organizations can share valuable information among each other. However, certain user...
David Liu, Kincho H. Law, Gio Wiederhold