Sciweavers

ICSE
2008
IEEE-ACM
14 years 5 months ago
Static detection of cross-site scripting vulnerabilities
Web applications support many of our daily activities, but they often have security problems, and their accessibility makes them easy to exploit. In cross-site scripting (XSS), an...
Gary Wassermann, Zhendong Su
ICSE
2008
IEEE-ACM
14 years 5 months ago
Evolving software product lines with aspects: an empirical study on design stability
Software product lines (SPLs) enable modular, large-scale reuse through a software architecture addressing multiple core and varying features. To reap the benefits of SPLs, their ...
Alessandro Garcia, Cláudio Sant'Anna, Eduar...
ICSE
2008
IEEE-ACM
14 years 5 months ago
Design and implementation of the software architecture for a 3-D reconstruction system in medical imaging
The design and implementation of the reconstruction system in medical X-ray imaging is a challenging issue due to its immense computational demands. In order to ensure an efficien...
Holger Scherl, Stefan Hoppe, Markus Kowarschik, Jo...
ICSE
2008
IEEE-ACM
14 years 5 months ago
Debugging reinvented: asking and answering why and why not questions about program behavior
When software developers want to understand the reason for a program's behavior, they must translate their questions about the behavior into a series of questions about code,...
Andrew Jensen Ko, Brad A. Myers
ICSE
2008
IEEE-ACM
14 years 5 months ago
The effect of program and model structure on mc/dc test adequacy coverage
Ajitha Rajan, Michael W. Whalen, Mats Per Erik Hei...
ICSE
2008
IEEE-ACM
14 years 5 months ago
Dynamic detection of atomic-set-serializability violations
Previously we presented atomic sets, memory locations that share some consistency property, and units of work, code fragments that preserve consistency of atomic sets on which the...
Christian Hammer, Julian Dolby, Mandana Vaziri, Fr...
ICSE
2008
IEEE-ACM
14 years 5 months ago
Clonetracker: tool support for code clone management
Code clones are generally considered to be an obstacle to software maintenance. Research has provided evidence that it may not always be practical, feasible, or cost-effective to ...
Ekwa Duala-Ekoko, Martin P. Robillard
ICSE
2008
IEEE-ACM
14 years 5 months ago
Precise memory leak detection for java software using container profiling
A memory leak in a Java program occurs when object references that are no longer needed are unnecessarily maintained. Such leaks are difficult to understand because static analyse...
Guoqing Xu, Atanas Rountev