Sciweavers

220 search results - page 14 / 44
» A Language Independent Approach for Detecting Duplicated Cod...
Sort
View
80
Voted
SIGSOFT
2007
ACM
16 years 1 months ago
Context-based detection of clone-related bugs
Studies show that programs contain much similar code, commonly known as clones. One of the main reasons for introducing clones is programmers' tendency to copy and paste code...
Lingxiao Jiang, Zhendong Su, Edwin Chiu
90
Voted
CL
2008
Springer
15 years 16 days ago
Foundations of a simple and unified component-oriented language
Component-orientedprogramming(COP)isactuallyakeyresearchtrackinsoftwareengineering.Avarietyofcomponent-oriented s (COLs) have been proposed with new or adapted abstractions and me...
Luc Fabresse, Christophe Dony, Marianne Huchard
88
Voted
CSMR
2009
IEEE
15 years 7 months ago
Identification of Extract Method Refactoring Opportunities
Extract Method has been recognized as one of the most important refactorings, since it decomposes large methods and can be used in combination with other refactorings for fixing a...
Nikolaos Tsantalis, Alexander Chatzigeorgiou
145
Voted
PLDI
2012
ACM
13 years 2 months ago
Fully automatic and precise detection of thread safety violations
Concurrent, object-oriented programs often use thread-safe library classes. Existing techniques for testing a thread-safe class either rely on tests using the class, on formal spe...
Michael Pradel, Thomas R. Gross
112
Voted
FDTC
2006
Springer
74views Cryptology» more  FDTC 2006»
15 years 4 months ago
Fault Attack Resistant Cryptographic Hardware with Uniform Error Detection
Traditional hardware error detection methods based on linear codes make assumptions about the typical or expected errors and faults and concentrate the detection power towards the ...
Konrad J. Kulikowski, Mark G. Karpovsky, Alexander...