Sciweavers

44 search results - page 2 / 9
» Mining source code to automatically split identifiers for so...
Sort
View
MSR
2005
ACM
13 years 11 months ago
Recovering system specific rules from software repositories
One of the most successful applications of static analysis based bug finding tools is to search the source code for violations of system-specific rules. These rules may describe h...
Chadd C. Williams, Jeffrey K. Hollingsworth
ICSE
2007
IEEE-ACM
14 years 5 months ago
Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis
This paper presents an approach to statically retrofit legacy servers with mechanisms for authorization policy enforcement. The approach is based upon the observation that securit...
Vinod Ganapathy, Dave King 0002, Trent Jaeger, Som...
ESORICS
2011
Springer
12 years 5 months ago
Who Wrote This Code? Identifying the Authors of Program Binaries
Program authorship attribution—identifying a programmer based on stylistic characteristics of code—has practical implications for detecting software theft, digital forensics, a...
Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller
CIKM
2009
Springer
13 years 9 months ago
Identifying static analysis techniques for finding non-fix hunks in fix revisions
Mining software repositories for bug detection requires accurate techniques of identifying bug-fix revisions. There have been many researches to find exact bug-fix revisions. Howe...
Yungbum Jung, Hakjoo Oh, Kwangkeun Yi
CORR
2006
Springer
138views Education» more  CORR 2006»
13 years 5 months ago
Applying and Combining Three Different Aspect Mining Techniques
Abstract. Understanding a software system at source-code level requires understanding the different concerns that it addresses, which in turn requires a way to identify these conce...
Mariano Ceccato, Marius Marin, Kim Mens, Leon Moon...