Sciweavers

WCRE
2008
IEEE
13 years 11 months ago
Automated Concept Location Using Independent Component Analysis
Concept location techniques are designed to help isolate sections of source code that relate to specific concepts. Blind Signal Separation techniques like Singular Value Decompos...
Scott Grant, James R. Cordy, David B. Skillicorn
KBSE
2008
IEEE
13 years 11 months ago
Semi-Automating Pragmatic Reuse Tasks
Developers undertaking a pragmatic reuse task must collect and reason about information that is spread throughout the source code of a system before they can understand the scope ...
Reid Holmes, Robert J. Walker
IWPC
2008
IEEE
13 years 11 months ago
Support for Understanding GUI Programs by Visualizing Execution Traces Synchronized with Screen Transitions
To support understanding a specific GUI functionality in a program, we propose a visualization technique that presents the correspondence between the screens before and after the...
Tatsuya Sato, Buntarou Shizuki, Jiro Tanaka
GLOBECOM
2008
IEEE
13 years 11 months ago
Generalized Capacity and Source-Channel Coding for Packet Erasure Channels
— We study the transmission of a stationary ergodic Gaussian source over a packet erasure channel, which is a composite channel with degraded states. A broadcast channel code can...
Yifan Liang, Andrea J. Goldsmith, Michelle Effros
DATE
2008
IEEE
106views Hardware» more  DATE 2008»
13 years 11 months ago
Source-Level Timing Annotation and Simulation for a Heterogeneous Multiprocessor
A generic and retargetable tool flow is presented that enables the export of timing data from software running on a cycle-accurate Virtual Prototype (VP) to a concurrent function...
Trevor Meyerowitz, Alberto L. Sangiovanni-Vincente...
CSMR
2008
IEEE
13 years 11 months ago
Towards Recovering Architectural Concepts Using Latent Semantic Indexing
Software engineers think about an existing software system in terms of high-level models. The high-level models are translated to source code and the concepts represented in these...
Pieter van der Spek, Steven Klusener, Piërre ...
MSR
2009
ACM
13 years 11 months ago
Code siblings: Technical and legal implications of copying code between applications
Source code cloning does not happen within a single system only. It can also occur between one system and another. We use the term code sibling to refer to a code clone that evolv...
Daniel M. Germán, Massimiliano Di Penta, Ya...
ISSTA
2009
ACM
13 years 11 months ago
Advanced code coverage analysis using substring holes
Code coverage is a common aid in the testing process. It is generally used for marking the source code segments that were executed and, more importantly, those that were not execu...
Yoram Adler, Eitan Farchi, Moshe Klausner, Dan Pel...
FOAL
2009
ACM
13 years 11 months ago
Unweaving the impact of aspect changes in AspectJ
Aspect-oriented programming (AOP) fosters the coding of tangled concerns in separated units that are then woven together in the executable system. Unfortunately, the oblivious nat...
Luca Cavallaro, Mattia Monga
SERA
2009
Springer
13 years 11 months ago
Syntactic and Semantic Prediction in Dynamic Languages
In the context of computer programming, the importance of computer assistance is being understood by many developer communities. Developers are e.g. using the same well known expre...
Jakub Mísek, Filip Zavoral