Sciweavers

150 search results - page 20 / 30
» tse 2008
Sort
View
TSE
2008
113views more  TSE 2008»
14 years 9 months ago
Discovering Neglected Conditions in Software by Mining Dependence Graphs
Neglected conditions are an important but difficult-to-find class of software defects. This paper presents a novel approach for revealing neglected conditions that integrates stati...
Ray-Yaung Chang, Andy Podgurski, Jiong Yang
TSE
2008
103views more  TSE 2008»
14 years 9 months ago
The Impact of Educational Background on the Effectiveness of Requirements Inspections: An Empirical Study
While the inspection of various software artifacts increases the quality of the end product, the effectiveness of an inspection largely depends on the individual inspectors involve...
Jeffrey C. Carver, Nachiappan Nagappan, Alan Page
TSE
2008
129views more  TSE 2008»
14 years 9 months ago
Classifying Software Changes: Clean or Buggy?
This paper introduces a new technique for predicting latent software bugs, called change classification. Change classification uses a machine learning classifier to determine wheth...
Sunghun Kim, E. James Whitehead Jr., Yi Zhang 0001
TSE
2008
103views more  TSE 2008»
14 years 9 months ago
A Realistic Empirical Evaluation of the Costs and Benefits of UML in Software Maintenance
The Unified Modeling Language (UML) is the de facto standard for object-oriented software analysis and design modeling. However, few empirical studies exist which investigate the c...
Wojciech J. Dzidek, Erik Arisholm, Lionel C. Brian...
TSE
2008
107views more  TSE 2008»
14 years 9 months ago
Security Requirements Engineering: A Framework for Representation and Analysis
This paper presents a framework for security requirements elicitation and analysis. The framework is based on constructing a context for the system, representing security requireme...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...