Sciweavers

13 search results - page 3 / 3
» wcre 2005
Sort
View
WCRE
2005
IEEE
13 years 11 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean
WCRE
2007
IEEE
13 years 11 months ago
Clone Detection via Structural Abstraction
tection via Structural Abstraction William S. Evans Department of Computer Science University of British Columbia Vancouver, B.C. V6T 1Z4, CANADA Christopher W. Fraser Microsoft Re...
William S. Evans, Christopher W. Fraser, Fei Ma
WCRE
2005
IEEE
13 years 11 months ago
When Functions Change Their Names: Automatic Detection of Origin Relationships
It is a common understanding that identifying the same entity such as module, file, and function between revisions is important for software evolution related analysis. Most softw...
Sunghun Kim, Kai Pan, E. James Whitehead Jr.