Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Maxime Lamothe"'
Publikováno v:
IEEE Transactions on Software Engineering. 48:3410-3422
Application Programming Interfaces (APIs) allow their users to reuse existing software functionality without implementing it by themselves. However, using external functionality can come at a cost. Because developers are decoupled from the API's inne
Online appendix for researcharticle: "A Comparison of the Trustworthiness of CIAcceleration Products".
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c8cebd87b0ae126344fa7b6eb566a2e9
Publikováno v:
Empirical Software Engineering. 28
Context: Changing a software application with many build-time configuration settings may introduce unexpected side-effects. For example, a change intended to be specific to a platform (e.g., Windows) or product configuration (e.g., community editions
Publikováno v:
ACM Computing Surveys. 54:1-36
Recent software advances have led to an expansion of the development and usage of application programming interfaces (APIs). From millions of Android packages (APKs) available on Google Store to millions of open-source packages available in Maven, Py
Publikováno v:
2022 IEEE International Conference on Software Maintenance and Evolution (ICSME).
Publikováno v:
Proceedings of the 44th International Conference on Software Engineering.
Publikováno v:
Proceedings of the 44th International Conference on Software Engineering: Software Engineering in Practice.
Publikováno v:
Empirical Software Engineering. 27
Publikováno v:
Empirical Software Engineering. 26
Performance bugs bear a heavy cost on both software developers and end-users. Tools to reduce the occurrence, impact, and repair time of performance bugs, can therefore provide key assistance for software developers racing to fix these bugs. Classifi
Publikováno v:
Empirical Software Engineering. 26
Non-functional bugs, e.g., performance bugs and security bugs, bear a heavy cost on both software developers and end-users. For example, IBM estimates the cost of a single data breach to be millions of dollars. Tools to reduce the occurrence, impact,