CORC

浏览/检索结果: 共50条,第1-10条 帮助

限定条件                    
已选(0)清除 条数/页:   排序方式:
Causes of architecture changes: An empirical study through the communication in OSS mailing lists 期刊论文
Proceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE, 2015, 卷号: 2015-January
作者:  Tang, Antony;  Liang, Peng;  Van Vliet, Hans;  Ding, Wei
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/05
Automatic detection of parameter shielding for test case generation 期刊论文
Proceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE, 2015, 卷号: 2015-January
作者:  Lin, Jingjian;  Xuan, Jifeng;  Yan, Jun
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/05
A Revisit of a Theoretical Analysis on Spectrum-Based Fault Localization 会议论文
作者:  Xie, Xiaoyuan;  Xu, Baowen;  Chen, Tsong Yueh;  Kuo, Fei-Ching
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/05
Web Service Customization based on Service Feature Model 会议论文
作者:  He, Keqing;  Tang, Mingdong;  Wang, Jian;  Peng, Zhenlian
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/05
Architectural Technical Debt Identification based on Architecture Decisions and Change Scenarios 会议论文
作者:  Li, Zengyang;  Liang, Peng;  Avgeriou, Paris
收藏  |  浏览/下载:6/0  |  提交时间:2019/12/05
Crash Reproduction via Test Case Mutation 会议论文
作者:  Xuan, Jifeng;  Xie, Xiaoyuan;  Monperrus, Martin
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/05
Exploiting global redundancy in big surveillance video data for efficient coding 期刊论文
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2015, 卷号: 18, 期号: 2
作者:  Xiao, Jing;  Liao, Liang;  Hu, Jinhui;  Chen, Yu;  Hu, Ruimin
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/05
Extracting more object usage scenarios for API protocol mining 期刊论文
Proceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE, 2015, 卷号: 2015-January
作者:  Chen, Deng;  Zhang, Yanduo;  Wang, Rongcun;  Qu, Binbin;  Ju, Jianping
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/05
Capability representation model for heterogeneous remote sensing sensors: Case study on soil moisture monitoring 期刊论文
ENVIRONMENTAL MODELLING & SOFTWARE, 2015, 卷号: 70
作者:  Fan, Hong;  Li, Jia;  Chen, NengCheng;  Hu, Chuli
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/05
Reversing and Identifying Overwritten Data Structures for Memory-Corruption Exploit Diagnosis 期刊论文
Proceedings - International Computer Software and Applications Conference, 2015, 卷号: 2
作者:  Zhao, Lei;  Wang, Run;  Wang, Lina;  Cheng, Yueqiang
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/05


©版权所有 ©2017 CSpace - Powered by CSpace