Sciweavers

ICSE
2008
IEEE-ACM
14 years 5 months ago
A study of student strategies for the corrective maintenance of concurrent software
Graduates of computer science degree programs are increasingly being asked to maintain large, multi-threaded software systems; however, the maintenance of such systems is typicall...
Scott D. Fleming, Eileen Kraemer, R. E. Kurt Stire...
ICSE
2008
IEEE-ACM
14 years 5 months ago
On the difficulty of replicating human subjects studies in software engineering
Replications play an important role in verifying empirical results. In this paper, we discuss our experiences performing a literal replication of a human subjects experiment that ...
Jonathan Lung, Jorge Aranda, Steve M. Easterbrook,...
ICSE
2008
IEEE-ACM
14 years 5 months ago
Static detection of cross-site scripting vulnerabilities
Web applications support many of our daily activities, but they often have security problems, and their accessibility makes them easy to exploit. In cross-site scripting (XSS), an...
Gary Wassermann, Zhendong Su
ICSE
2008
IEEE-ACM
14 years 5 months ago
Evolving software product lines with aspects: an empirical study on design stability
Software product lines (SPLs) enable modular, large-scale reuse through a software architecture addressing multiple core and varying features. To reap the benefits of SPLs, their ...
Alessandro Garcia, Cláudio Sant'Anna, Eduar...
ICSE
2008
IEEE-ACM
14 years 5 months ago
Design and implementation of the software architecture for a 3-D reconstruction system in medical imaging
The design and implementation of the reconstruction system in medical X-ray imaging is a challenging issue due to its immense computational demands. In order to ensure an efficien...
Holger Scherl, Stefan Hoppe, Markus Kowarschik, Jo...
ICSE
2008
IEEE-ACM
14 years 5 months ago
Debugging reinvented: asking and answering why and why not questions about program behavior
When software developers want to understand the reason for a program's behavior, they must translate their questions about the behavior into a series of questions about code,...
Andrew Jensen Ko, Brad A. Myers
ICSE
2008
IEEE-ACM
14 years 5 months ago
The effect of program and model structure on mc/dc test adequacy coverage
Ajitha Rajan, Michael W. Whalen, Mats Per Erik Hei...
ICSE
2008
IEEE-ACM
14 years 5 months ago
Dynamic detection of atomic-set-serializability violations
Previously we presented atomic sets, memory locations that share some consistency property, and units of work, code fragments that preserve consistency of atomic sets on which the...
Christian Hammer, Julian Dolby, Mandana Vaziri, Fr...
ICSE
2008
IEEE-ACM
14 years 5 months ago
Clonetracker: tool support for code clone management
Code clones are generally considered to be an obstacle to software maintenance. Research has provided evidence that it may not always be practical, feasible, or cost-effective to ...
Ekwa Duala-Ekoko, Martin P. Robillard
ICSE
2008
IEEE-ACM
14 years 5 months ago
Precise memory leak detection for java software using container profiling
A memory leak in a Java program occurs when object references that are no longer needed are unnecessarily maintained. Such leaks are difficult to understand because static analyse...
Guoqing Xu, Atanas Rountev