Sciweavers

150 search results - page 19 / 30
» tse 2008
Sort
View
TSE
2008
92views more  TSE 2008»
14 years 9 months ago
Metrics for Measuring the Quality of Modularization of Large-Scale Object-Oriented Software
The metrics formulated to date for characterizing the modularization quality of object-oriented software have considered module and class to be synonymous concepts. But, a typical ...
Santonu Sarkar, Avinash C. Kak, Girish Maskeri Ram...
TSE
2008
128views more  TSE 2008»
14 years 9 months ago
Analyzing Regulatory Rules for Privacy and Security Requirements
Information practices that use personal, financial, and health-related information are governed by US laws and regulations to prevent unauthorized use and disclosure. To ensure com...
Travis D. Breaux, Annie I. Antón
TSE
2008
89views more  TSE 2008»
14 years 9 months ago
WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation
Many software systems have evolved to include a Web-based component that makes them available to the public via the Internet and can expose them to a variety of Web-based attacks. ...
William G. J. Halfond, Alessandro Orso, Pete Manol...
TSE
2008
92views more  TSE 2008»
14 years 9 months ago
Evaluating Test Suites and Adequacy Criteria Using Simulation-Based Models of Distributed Systems
Test adequacy criteria provide the engineer with guidance on how to populate test suites. While adequacy criteria have long been a focus of research, existing testing methods do no...
Matthew J. Rutherford, Antonio Carzaniga, Alexande...
TSE
2008
91views more  TSE 2008»
14 years 9 months ago
Privately Finding Specifications
Buggy software is a reality and automated techniques for discovering bugs are highly desirable. A specification describes the correct behavior of a program. For example, a file mus...
Westley Weimer, Nina Mishra