Sciweavers

97
Voted
ICSE
2007
IEEE-ACM
16 years 19 days ago
Automated Generation of Context-Aware Tests
The incorporation of context-awareness capabilities into pervasive applications allows them to leverage contextual information to provide additional services while maintaining an ...
Zhimin Wang, Sebastian G. Elbaum, David S. Rosenbl...
108
Voted
ICSE
2007
IEEE-ACM
16 years 19 days ago
Performance Evaluation and Prediction for Legacy Information Systems
Database-centric information systems are critical to the operations of large organisations. In particular, they often process a large amount of data with stringent performance req...
Yan Jin, Antony Tang, Jun Han, Yan Liu
ICSE
2007
IEEE-ACM
16 years 19 days ago
The Factory Pattern in API Design: A Usability Evaluation
Brian Ellis, Jeffrey Stylos, Brad A. Myers
105
Voted
ICSE
2007
IEEE-ACM
16 years 19 days ago
Ownership and Immutability Inference for UML-Based Object Access Control
We propose a mechanism for object access control which is based on the UML. Specifically, we propose use of ownership and immutability constraints on UML associations and verifica...
Yin Liu, Ana Milanova
ICSE
2007
IEEE-ACM
16 years 19 days ago
Behaviour Model Synthesis from Properties and Scenarios
Synthesis of behaviour models from software development artifacts such as scenario-based descriptions or requirements specifications not only helps significantly reduce the effort...
Greg Brunet, Marsha Chechik, Sebastián Uchi...
78
Voted
ICSE
2007
IEEE-ACM
16 years 19 days ago
Information Hiding and Visibility in Interface Specifications
Gary T. Leavens, Peter Müller
67
Voted
ICSE
2007
IEEE-ACM
16 years 19 days ago
SoQueT: Query-Based Documentation of Crosscutting Concerns
Marius Marin, Leon Moonen, Arie van Deursen
ICSE
2007
IEEE-ACM
16 years 19 days ago
Tracking Code Clones in Evolving Software
Code clones are generally considered harmful in software development, and the predominant approach is to try to eliminate them through refactoring. However, recent research has pr...
Ekwa Duala-Ekoko, Martin P. Robillard
92
Voted
ICSE
2007
IEEE-ACM
16 years 19 days ago
When Role Models Have Flaws: Static Validation of Enterprise Security Policies
Modern multiuser software systems have adopted RoleBased Access Control (RBAC) for authorization management. This paper presents a formal model for RBAC policy validation and a st...
Marco Pistoia, Stephen J. Fink, Robert J. Flynn, E...
110
Voted
ICSE
2007
IEEE-ACM
16 years 19 days ago
Revel8or: Model Driven Capacity Planning Tool Suite
Designing complex multi-tier applications that must meet strict performance requirements is a challenging software engineering problem. Ideally, the application architect could de...
Liming Zhu, Yan Liu, Ngoc Bao Bui, Ian Gorton