Sciweavers

WM
2003
13 years 5 months ago
Case-Based Reuse of Software Examplets
: We present a software tool for examplet reuse. We define examplets to be goal-directed snippets of source code, often written for tutorial purposes, that show how to use program...
Markus Grabert, Derek G. Bridge
DAGSTUHL
2006
13 years 6 months ago
Rule-based Model Extraction from Source Code
Abstract. In the context of an approach for reengineering legacy software systems at the architectural level, we present in this paper a reverse engineering methodology that uses a...
Rui Correia, Carlos M. P. Matos, Mohammad El-Ramly...
SETP
2007
13 years 6 months ago
Dimensional Inference Using Symbol Lives
Scientific equations embedded in computer programs must obey the rules for dimensional consistency. Many efforts have been made to enforce these rules within computer programs. So...
Brian Farrimond, John Collins
SPLC
2008
13 years 6 months ago
Visualizing Software Product Line Variabilities in Source Code
Implementing software product lines is a challenging task. Depending on the implementation technique the code that realizes a feature is often scattered across multiple code units...
Christian Kästner, Salvador Trujillo, Sven Ap...
NIPS
2007
13 years 6 months ago
Mining Internet-Scale Software Repositories
Large repositories of source code create new challenges and opportunities for statistical machine learning. Here we first develop Sourcerer, an infrastructure for the automated c...
Erik Linstead, Paul Rigor, Sushil Krishna Bajracha...
APVIS
2008
13 years 6 months ago
StarGate: A Unified, Interactive Visualization of Software Projects
With the success of open source software projects, such as Apache and Mozilla, comes the opportunity to study the development process. In this paper, we present StarGate: a novel ...
Kwan-Liu Ma
APCCM
2008
13 years 6 months ago
A Practical Guide to Testing the Understandability of Notations
Model-driven development is the process of creating models of a software system and transforming them into source code. Since the stepwise transformations can be done automaticall...
Susanne Patig
USENIX
2007
13 years 6 months ago
From STEM to SEAD: Speculative Execution for Automated Defense
Most computer defense systems crash the process that they protect as part of their response to an attack. Although recent research explores the feasibility of selfhealing to autom...
Michael E. Locasto, Angelos Stavrou, Gabriela F. C...
WCRE
1995
IEEE
13 years 8 months ago
Pattern Matching for Design Concept Localization
A legacy system is an operational, large-scale software system that is maintained beyond its first generation of programmers. It typically represents a massive economic investmen...
Kostas Kontogiannis, Renato de Mori, Morris Bernst...
ICSE
1995
IEEE-ACM
13 years 8 months ago
A Framework for Selective Recompilation in the Presence of Complex Intermodule Dependencies
Compilers and other programming environment tools derive information from the source code of programs; derived information includes compiled code, interprocedural summary informat...
Craig Chambers, Jeffrey Dean, David Grove