Sciweavers

533 search results - page 107 / 107
» Verification of Distributed Firewalls
Sort
View
164
Voted
SIGSOFT
2010
ACM
15 years 1 months ago
Differential static analysis: opportunities, applications, and challenges
It is widely believed that program analysis can be more closely targeted to the needs of programmers if the program is accompanied by further redundant documentation. This may inc...
Shuvendu K. Lahiri, Kapil Vaswani, C. A. R. Hoare
125
Voted
SIGSOFT
2010
ACM
15 years 1 months ago
The missing links: bugs and bug-fix commits
Empirical studies of software defects rely on links between bug databases and program code repositories. This linkage is typically based on bug-fixes identified in developer-enter...
Adrian Bachmann, Christian Bird, Foyzur Rahman, Pr...
153
Voted
ATAL
2011
Springer
14 years 3 months ago
The effect of expression of anger and happiness in computer agents on negotiations with humans
There is now considerable evidence in social psychology, economics, and related disciplines that emotion plays an important role in negotiation. For example, humans make greater c...
Celso M. de Melo, Peter Carnevale, Jonathan Gratch