Sciweavers

1368 search results - page 100 / 274
» Understanding Software Systems Using Reverse Engineering Tec...
Sort
View
WCRE
2005
IEEE
15 years 7 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean
WCRE
2000
IEEE
15 years 6 months ago
FAMIX and XMI
Recently exchange formats have gained lots of attention. Multiple tools need to interact and/or work on the same software system. Especially there is a need to reuse parser techno...
Sander Tichelaar, Stéphane Ducasse, Serge D...
ICSM
2007
IEEE
15 years 8 months ago
Empirical Evidence for SOC Dynamics in Software Evolution
We examine eleven large open source software systems and present empirical evidence for the existence of fractal structures in software evolution. In our study, fractal structures...
Jingwei Wu, Richard C. Holt, Ahmed E. Hassan
ECOOPWEXCEPTION
2000
Springer
15 years 5 months ago
A Fully Object-Oriented Exception Handling System: Rationale and Smalltalk Implementation
This paper motivates and presents the specification and the implementation of an exception handling system for an dynamically typed object-oriented language. A full object-oriented...
Christophe Dony
RE
2001
Springer
15 years 6 months ago
The Role of Policy and Stakeholder Privacy Values in Requirements Engineering
Diverse uses of information technology (IT) in organizations affect privacy. Developers of electronic commerce, database management, security mechanisms, telecommunication and col...
Annie I. Antón, Julia Brande Earp, Thomas A...