Sciweavers

1631 search results - page 206 / 327
» Software engineering technology watch
Sort
View
ICSE
2009
IEEE-ACM
16 years 5 months ago
Equality and hashing for (almost) free: Generating implementations from abstraction functions
ng Implementations from Abstraction Functions Derek Rayside, Zev Benjamin, Rishabh Singh, Joseph P. Near, Aleksandar Milicevic and Daniel Jackson Computer Science and Artificial In...
Derek Rayside, Zev Benjamin, Rishabh Singh, Joseph...
ICSE
2003
IEEE-ACM
16 years 4 months ago
Improving Test Suites via Operational Abstraction
g Test Suites via Operational Abstraction Michael Harder Jeff Mellen Michael D. Ernst MIT Lab for Computer Science 200 Technology Square Cambridge, MA 02139 USA {mharder,jeffm,mern...
Michael Harder, Jeff Mellen, Michael D. Ernst
ICSE
2004
IEEE-ACM
16 years 4 months ago
Dependable Composite Web Services with Components Upgraded Online
Achieving high dependability of Web Services (WSs) dynamically composed from component WSs is an open problem. One of the main difficulties here is due to the fact that the compone...
Anatoliy Gorbenko, Vyacheslav S. Kharchenko, Peter...
CISIS
2010
IEEE
15 years 11 months ago
UbiPAN: A Bluetooth Extended Personal Area Network
—Most mobile devices are now Bluetooth-enabled. This wireless technology makes it possible to transfer files or stream contents between pieces of equipment. The possibly many de...
Jeremie Albert, Tegawende F. Bissyande, Yér...
IDTRUST
2010
ACM
15 years 11 months ago
Computational techniques for increasing PKI policy comprehension by human analysts
Natural-language policies found in X.509 PKI describe an organization’s stated policy as a set of requirements for trust. The widespread use of X.509 underscores the importance ...
Gabriel A. Weaver, Scott A. Rea, Sean W. Smith