Sciweavers

852 search results - page 25 / 171
» Understanding How the Requirements Are Implemented in Source...
Sort
View
88
Voted
CORR
2010
Springer
135views Education» more  CORR 2010»
14 years 11 months ago
Automatic derivation of domain terms and concept location based on the analysis of the identifiers
Abstract. Developers express the meaning of the domain ideas in specifically selected identifiers and comments that form the target implemented code. Software maintenance requires ...
Peter Václavík, Jaroslav Porubä...
ICAIL
2007
ACM
15 years 3 months ago
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...
HCI
2007
15 years 1 months ago
Understanding RUTH: Creating Believable Behaviors for a Virtual Human Under Uncertainty
In pursuing the ultimate goal of enabling intelligent conversation with a virtual human, two key challenges are selecting nonverbal behaviors to implement and realizing those behav...
Insuk Oh, Matthew Stone
67
Voted
TIT
2008
86views more  TIT 2008»
14 years 11 months ago
A One-to-One Code and Its Anti-Redundancy
One-to-one codes are "one shot" codes that assign a distinct codeword to source symbols and are not necessarily prefix codes (more generally, uniquely decodable). For ex...
Wojciech Szpankowski
ECLIPSE
2006
ACM
15 years 5 months ago
FrUiT: IDE support for framework understanding
Frameworks provide means to reuse existing design and functionality, but first require developers to understand how to use them. Learning the correct usage of a framework can be ...
Marcel Bruch, Thorsten Schäfer, Mira Mezini