Sciweavers

2631 search results - page 365 / 527
» Software Development with Code Maps
Sort
View
100
Voted
SIGSOFT
2008
ACM
16 years 3 months ago
Effective blame for information-flow violations
Programs trusted with secure information should not release that information in ways contrary to system policy. However, when a program contains an illegal flow of information, cu...
Dave King 0002, Trent Jaeger, Somesh Jha, Sanjit A...
108
Voted
CSMR
2009
IEEE
15 years 9 months ago
Identification of Extract Method Refactoring Opportunities
Extract Method has been recognized as one of the most important refactorings, since it decomposes large methods and can be used in combination with other refactorings for fixing a...
Nikolaos Tsantalis, Alexander Chatzigeorgiou
92
Voted
CODES
2008
IEEE
15 years 9 months ago
Dynamic tuning of configurable architectures: the AWW online algorithm
Architectures with software-writable parameters, or configurable architectures, enable runtime reconfiguration of computing platforms to the applications they execute. Such dynami...
Chen Huang, David Sheldon, Frank Vahid
SEAA
2008
IEEE
15 years 9 months ago
Checking Session-Oriented Interactions between Web Services
Although web services are generally envisioned as being stateless, some of them are implicitly stateful. The reason is that the web services often work as front-ends to enterprise...
Pavel Parizek, Jirí Adámek
111
Voted
WCRE
2008
IEEE
15 years 9 months ago
Detecting Clones in Business Applications
A business application automates a collection of business processes. A business process describes how a set of logically related tasks are executed, ordered and managed by followi...
Jin Guo, Ying Zou