Sciweavers

220 search results - page 7 / 44
» A Language Independent Approach for Detecting Duplicated Cod...
Sort
View
TOOLS
2009
IEEE
15 years 7 months ago
Reusing and Composing Tests with Traits
Single inheritance often forces developers to duplicate code and logic. This widely recognized situation affects both business code and tests. In a large and complex application w...
Stéphane Ducasse, Damien Pollet, Alexandre ...
ECBS
2005
IEEE
108views Hardware» more  ECBS 2005»
15 years 2 months ago
Interceptor Based Constraint Violation Detection
Monitoring critical events such as constraints violations is one of the key issues of Autonomic Systems. This paper presents an interceptor based approach of constraint violation ...
Qianxiang Wang, Aditya P. Mathur
93
Voted
CC
2003
Springer
114views System Software» more  CC 2003»
15 years 5 months ago
Combined Code Motion and Register Allocation Using the Value State Dependence Graph
We define the Value State Dependence Graph (VSDG). The VSDG is a form of the Value Dependence Graph (VDG) extended by the addition of state dependence edges to model sequentialise...
Neil Johnson, Alan Mycroft
114
Voted
ACSC
2006
IEEE
15 years 6 months ago
Plagiarism detection across programming languages
Plagiarism is a widespread problem in assessment tasks; in computing courses, students often plagiarise source code. For all but the smallest classes, manual detection of such pla...
Christian Arwin, Seyed M. M. Tahaghoghi
OOPSLA
2010
Springer
14 years 10 months ago
Scalable and systematic detection of buggy inconsistencies in source code
Software developers often duplicate source code to replicate functionality. This practice can hinder the maintenance of a software project: bugs may arise when two identical code ...
Mark Gabel, Junfeng Yang, Yuan Yu, Moisés G...