Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- articleJanuary 2017
LeakSpot: detection and diagnosis of memory leaks in JavaScript applications
Software—Practice & Experience (SPRE), Volume 47, Issue 1Pages 97–123https://doi.org/10.1002/spe.2406The migration of application logic to the client side of modern web applications and the use of JavaScript as the main language for client-side development have made memory leaks in JavaScript an issue for web applications. Client-side web applications ...
- articleOctober 2016
DataMill: a distributed heterogeneous infrastructure forrobust experimentation
Software—Practice & Experience (SPRE), Volume 46, Issue 10Pages 1411–1440https://doi.org/10.1002/spe.2382Empirical systems research is facing a dilemma. Minor aspects of an experimental setup can have a significant impact on its associated performance measurements and potentially invalidate conclusions drawn from them. Examples of such influences, often ...
- articleMarch 2015
A recommendation system for repairing violations detected by static architecture conformance checking
Software—Practice & Experience (SPRE), Volume 45, Issue 3Pages 315–342https://doi.org/10.1002/spe.2228This paper describes a recommendation system that provides refactoring guidelines for maintainers when tackling architectural erosion. The paper formalizes 32refactoring recommendations to repair violations raised by static architecture conformance ...
- articleDecember 2014
The use of mTags for mandatory security: a case study
Software—Practice & Experience (SPRE), Volume 44, Issue 12Pages 1511–1523https://doi.org/10.1002/spe.2222mTags is an efficient mechanism that augments inter-thread messages with lightweight metadata. We introduce and discuss a case study that we have conducted in the use of mTags for realizing a kind of mandatory security. Although mTags can be implemented ...
- articleFebruary 2012
Towards a goal-driven approach to action selection in self-adaptive software
Software—Practice & Experience (SPRE), Volume 42, Issue 2Pages 211–233https://doi.org/10.1002/spe.1066Self-adaptive software is a closed-loop system, since it continuously monitors its context (i.e. environment) and/or self (i.e. software entities) in order to adapt itself properly to changes. We believe that representing adaptation goals explicitly and ...
- articleJanuary 2006
Automating the analysis of design component contracts: Research Articles
Software patterns are a new design paradigm used to solve problems that arise when developing software within a particular context. Patterns capture the static and dynamic structure and collaboration among the components in a software design. A key ...
- articleApril 2004
Agents in object-oriented software engineering
Software engineers of multi-agent systems (MASs) are faced with different concerns such as autonomy, adaptation, interaction, collaboration, learning, and mobility, which are essentially different from classical concerns addressed in object-oriented ...
- articleApril 2002
Taming access control security: extending capabilities using the views relationship
Software—Practice & Experience (SPRE), Volume 32, Issue 4Pages 341–358https://doi.org/10.1002/spe.440The 'views' relationship indicates how an object-oriented design can be clearly separated into objects and their corresponding interface. This paper uses the concept of 'views' in order to achieve full separation between the application and the security ...