Sciweavers

2631 search results - page 411 / 527
» Software Development with Code Maps
Sort
View
ECIS
2004
15 years 3 months ago
Activity Based generation of requirements for web-based information systems: the SSM/ICDT approach
Web site development method is at an early stage in its evolution. Most existing methods are concerned with technical software issues and are poorly adapted to help developers thi...
Mary Meldrum, Jeremy Rose
STORAGESS
2005
ACM
15 years 7 months ago
An electric fence for kernel buffers
Improper access of data buffers is one of the most common errors in programs written in assembler, C, C++, and several other languages. Existing programs and OSs frequently acces...
Nikolai Joukov, Aditya Kashyap, Gopalan Sivathanu,...
SIGSOFT
2007
ACM
16 years 3 months ago
Context-based detection of clone-related bugs
Studies show that programs contain much similar code, commonly known as clones. One of the main reasons for introducing clones is programmers' tendency to copy and paste code...
Lingxiao Jiang, Zhendong Su, Edwin Chiu
OOPSLA
2007
Springer
15 years 8 months ago
Living in the comfort zone
A comfort zone is a tested region of a system’s input space within which it has been observed to behave acceptably. To keep systems operating within their comfort zones, we advo...
Martin C. Rinard
CODES
2005
IEEE
15 years 8 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...