Sciweavers

1099 search results - page 188 / 220
» Using Transformation Systems for Software Maintenance and Re...
Sort
View
SCAM
2006
IEEE
15 years 9 months ago
Factoring Differences for Iterative Change Management
An approach for factoring source-code differences is presented. A single large difference between two versions of a program is decomposed into factors (i.e., smaller changes). The...
Michael L. Collard, Huzefa H. Kagdi, Jonathan I. M...
IUI
2006
ACM
15 years 9 months ago
Splitting rules for graceful degradation of user interfaces
This paper addresses the problem of the graceful degradation of user interfaces where an initial interface is transferred to a smaller platform. It presents a technique for pagina...
Murielle Florins, Francisco Montero Simarro, Jean ...
INFSOF
2010
112views more  INFSOF 2010»
15 years 1 months ago
Experimental program analysis
Program analysis techniques are used by software engineers to deduce and infer characteristics of software systems. Recent research has suggested that certain program analysis tec...
Joseph R. Ruthruff, Sebastian G. Elbaum, Gregg Rot...
CLOUD
2010
ACM
15 years 8 months ago
A self-organized, fault-tolerant and scalable replication scheme for cloud storage
Failures of any type are common in current datacenters, partly due to the higher scales of the data stored. As data scales up, its availability becomes more complex, while differe...
Nicolas Bonvin, Thanasis G. Papaioannou, Karl Aber...
SP
2005
IEEE
188views Security Privacy» more  SP 2005»
15 years 8 months ago
BIND: A Fine-Grained Attestation Service for Secure Distributed Systems
In this paper, we propose BIND (Binding Instructions aNd Data),1 a fine-grained attestation service for securing distributed systems. Code attestation has recently received consi...
Elaine Shi, Adrian Perrig, Leendert van Doorn