CDN加速镜像 | 设为首页 | 加入收藏夹
当前位置: 首页 资源下载 文档资料 软件工程

文件名称:ICSE08

  • 所属分类:
  • 标签属性:
  • 上传时间:
    2012-11-16
  • 文件大小:
    7.33mb
  • 已下载:
    0次
  • 提 供 者:
  • 相关连接:
  • 下载说明:
    别用迅雷下载,失败请重下,重下不扣分!

介绍说明--下载内容来自于网络,使用问题请自行百度

2008年软件工程的论文集,一共二十几篇-2008 Essays on software engineering, a total of 20 articles
(系统自动生成,下载前可以参看下载内容)

下载文件列表

1. A comparative analysis of the efficiency of change metrics and static code attributes for defect prediction.pdf
2. An empirical study of the effects of test-suite reduction on fault localization.pdf
3. ARTOO--adaptive random testing for object-oriented software.pdf
4. Automatic generation of software behavioral models.pdf
5. Using components for architecture-based management--the self-repair case.pdf
6. Towards reusable components with aspects--an empirical study on modularity and obliviousness.pdf
7. Scalable detection of semantic clones.pdf
8. Open source software peer review practices--a case study of the apache server.pdf
9. jPredictor--a predictive runtime analysis tool for java.pdf
10. Early prediction of software component reliability.pdf
11. Design and implementation of the software architecture for a 3-D reconstruction system in medical imaging.pdf
12. Breaking the barriers to successful refactoring--observations and tools for extract method.pdf
13. The influence of organizational structure on software quality--an empirical case study.pdf
14. An empirical study of software developers' management of dependencies and changes.pdf
15. Defining and continuous checking of structural program dependencies.pdf
16. Precise memory leak detection for java software using container profiling.pdf
17. Predicting defects using network analysis on dependency graphs.pdf
18. Recommending adaptive changes for framework evolution.pdf
19. Supporting requirements engineering for medical products--early consideration of user-perceived quality.pdf
20. An approach to detecting duplicate bug reports using natural language and execution information.pdf
21. Systematically refactoring inheritance to delegation in java.pdf
22. Executable misuse cases for modeling security concerns.pdf
23. Mining framework usage changes from instantiation code.pdf

相关说明

  • 本站资源为会员上传分享交流与学习,如有侵犯您的权益,请联系我们删除.
  • 搜珍网是交换下载平台,只提供交流渠道,下载内容来自于网络,除下载问题外,其它问题请自行百度。更多...
  • 本站已设置防盗链,请勿用迅雷、QQ旋风等下载软件下载资源,下载后用WinRAR最新版进行解压.
  • 如果您发现内容无法下载,请稍后再次尝试;或换浏览器;或者到消费记录里找到下载记录反馈给我们.
  • 下载后发现下载的内容跟说明不相乎,请到消费记录里找到下载记录反馈给我们,经确认后退回积分.
  • 如下载前有疑问,可以通过点击"提供者"的名字,查看对方的联系方式,联系对方咨询.

相关评论

暂无评论内容.

发表评论

*快速评论: 推荐 一般 有密码 和说明不符 不是源码或资料 文件不全 不能解压 纯粹是垃圾
*内  容:
*验 证 码:
搜珍网 www.dssz.com