Sciweavers

4923 search results - page 177 / 985
» Software Risk Management
Sort
View
ICSE
2008
IEEE-ACM
16 years 5 months ago
Clonetracker: tool support for code clone management
Code clones are generally considered to be an obstacle to software maintenance. Research has provided evidence that it may not always be practical, feasible, or cost-effective to ...
Ekwa Duala-Ekoko, Martin P. Robillard
VAMOS
2010
Springer
15 years 6 months ago
Using Incremental Consistency Management for Conformance Checking in Feature-Oriented Model-Driven Engineering
Feature-Oriented Model-Driven Engineering (FOMDE) is an approach that lies at the intersection of two complementary paradigms for software construction, Model Driven Engineering (M...
Roberto E. Lopez-Herrejon, Alexander Egyed, Salvad...
ICSE
2011
IEEE-ACM
14 years 8 months ago
Understanding broadcast based peer review on open source software projects
Software peer review has proven to be a successful technique in open source software (OSS) development. In contrast to industry, where reviews are typically assigned to specific ...
Peter C. Rigby, Margaret-Anne D. Storey
COMPSAC
2000
IEEE
15 years 9 months ago
Transforming Legacy Energy Management System (EMS) Modules into Reusable Components: A Case Study
: A two-layer adaptive wrapping technique is proposed in this paper to migrate legacy Energy Management System (EMS) modules into reusable components, and therefore transforming th...
Qing Zhao, Hoh In, Xiaowei Wu, Garng M. Huang
COMCOM
2007
100views more  COMCOM 2007»
15 years 4 months ago
Using the vulnerability information of computer systems to improve the network security
In these years, the security problem becomes more important to everyone using computers. However, vulnerabilities on computers are found so frequently that system managers can not...
Yeu-Pong Lai, Po-Lun Hsia