Sciweavers

2 search results - page 1 / 1
» Understanding Cyber Trust Using a Triadic Functioning Analys...
Sort
View
107
Voted
APSCC
2008
IEEE
15 years 4 months ago
Understanding Cyber Trust Using a Triadic Functioning Analysis
Although social informatics has been a subject of systematic analytical and critical research for more than three decades, previous research has rarely noted the importance of soc...
Wen-Kung Lin, Chieh-Peng Lin, Chou-Kang Chiu
134
Voted
OOPSLA
2010
Springer
15 years 1 months ago
Scalable and systematic detection of buggy inconsistencies in source code
Software developers often duplicate source code to replicate functionality. This practice can hinder the maintenance of a software project: bugs may arise when two identical code ...
Mark Gabel, Junfeng Yang, Yuan Yu, Moisés G...