Sciweavers

32 search results - page 2 / 7
» scam 2008
Sort
View
SCAM
2008
IEEE
13 years 11 months ago
Automated Migration of List Based JSP Web Pages to AJAX
AJAX is a web application programming technique that allows portions of a web page to be loaded dynamically, separate from other parts of the web page. This gives the user a much ...
Jason Chu, Thomas R. Dean
SCAM
2008
IEEE
13 years 11 months ago
Is Cloned Code More Stable than Non-cloned Code?
This paper presents a study on the stability of cloned code. The results from an analysis of 200 weeks of evolution of five software system show that the stability as measured by...
Jens Krinke
SCAM
2008
IEEE
13 years 11 months ago
Type Highlighting: A Client-Driven Visual Approach for Class Hierarchies Reengineering
Polymorphism and class hierarchies are key to increasing the extensibility of an object-oriented program but also raise challenges for program comprehension. Despite many advances...
Petru Florin Mihancea
SCAM
2008
IEEE
13 years 11 months ago
Constructing Subtle Faults Using Higher Order Mutation Testing
Traditional mutation testing considers only first order mutants, created by the injection of a single fault. Often these first order mutants denote trivial faults that are easil...
Yue Jia, Mark Harman
SCAM
2008
IEEE
13 years 11 months ago
The Evolution and Decay of Statically Detected Source Code Vulnerabilities
The presence of vulnerable statements in the source code is a crucial problem for maintainers: properly monitoring and, if necessary, removing them is highly desirable to ensure h...
Massimiliano Di Penta, Luigi Cerulo, Lerina Aversa...