Sciweavers

510 search results - page 43 / 102
» An IDE for software development using tabular expressions
Sort
View
KDD
2006
ACM
381views Data Mining» more  KDD 2006»
16 years 6 days ago
GPLAG: detection of software plagiarism by program dependence graph analysis
Along with the blossom of open source projects comes the convenience for software plagiarism. A company, if less self-disciplined, may be tempted to plagiarize some open source pr...
Chao Liu 0001, Chen Chen, Jiawei Han, Philip S. Yu
SIGSOFT
2004
ACM
16 years 16 days ago
Implementing protocols via declarative event patterns
This paper introduces declarative event patterns (DEPs) as a means to implement protocols while improving their traceability, comprehensibility, and maintainability. DEPs are desc...
Robert J. Walker, Kevin Viggers
ICSE
2003
IEEE-ACM
15 years 12 months ago
ViewPoints: meaningful relationships are difficult!
The development of complex systems invariably involves many stakeholders who have different perspectives on the problem they are addressing, the system being developed, and the pr...
Bashar Nuseibeh, Jeff Kramer, Anthony Finkelstein
ISSTA
2010
ACM
15 years 1 months ago
Perturbing numerical calculations for statistical analysis of floating-point program (in)stability
Writing reliable software is difficult. It becomes even more difficult when writing scientific software involving floating-point numbers. Computers provide numbers with limite...
Enyi Tang, Earl T. Barr, Xuandong Li, Zhendong Su
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 4 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw