Sciweavers

WCRE
2000
IEEE
13 years 9 months ago
Towards Portable Source Code Representations using XML
One of the most important issue in source code analysis and software re-engineering is the representation of ode text at an abstraction level and form suitable for algorithmic pro...
Evan Mamas, Kostas Kontogiannis
SP
2000
IEEE
105views Security Privacy» more  SP 2000»
13 years 9 months ago
Open Source in Security: Visiting the Bizarre
Although open-source software development has virtues, there is reason to believe that the approach would not have a significant effect on the security of today’s systems. The ...
Fred B. Schneider
SP
2000
IEEE
13 years 9 months ago
Security and Source Code Access: Issues and Realities
This position paper addresses some of the benefits and drawbacks for security of open access to source code. After a discussion of alternative models for open access to source cod...
Steven B. Lipner
ICSM
2000
IEEE
13 years 9 months ago
Information Retrieval Models for Recovering Traceability Links between Code and Documentation
The research described in this paper is concerned with the application of information retrieval to software maintenance, and in particular to the problem of recovering traceabilit...
Giuliano Antoniol, Gerardo Canfora, Gerardo Casazz...
HICSS
2000
IEEE
121views Biometrics» more  HICSS 2000»
13 years 9 months ago
Working with Patterns and Code
This paper describes the basis for a suite of tools that let the programmer work in terms of design patterns and source code simultaneously. It first introduces a language for de...
Steven P. Reiss
ICVS
2001
Springer
13 years 9 months ago
Compiling SA-C Programs to FPGAs: Performance Results
Abstract. At the first ICVS, we presented SA-C (“sassy”), a singleassignment variant of the C programming language designed to exploit both coarse-grain and fine-grain parallel...
Bruce A. Draper, A. P. Wim Böhm, Jeffrey Hamm...
ICS
2001
Tsinghua U.
13 years 9 months ago
Tools for application-oriented performance tuning
Application performance tuning is a complex process that requires assembling various types of information and correlating it with source code to pinpoint the causes of performance...
John M. Mellor-Crummey, Robert J. Fowler, David B....
ESOP
2001
Springer
13 years 9 months ago
Typestate Checking of Machine Code
We check statically whether it is safe for untrusted foreign machine code to be loaded into a trusted host system. (Here “safety” means that the program abides by a memory-acc...
Zhichen Xu, Thomas W. Reps, Barton P. Miller
MSR
2009
ACM
13 years 9 months ago
Automatic labeling of software components and their evolution using log-likelihood ratio of word frequencies in source code
As more and more open-source software components become available on the internet we need automatic ways to label and compare them. For example, a developer who searches for reusa...
Adrian Kuhn
ICSE
2010
IEEE-ACM
13 years 9 months ago
Improved social trustability of code search results
Search is a fundamental activity in software development. However, to search source code efficiently, it is not sufficient to implement a traditional full text search over a base ...
Florian S. Gysin