Sciweavers

3456 search results - page 139 / 692
» Byte Code Engineering
Sort
View
94
Voted
SIGSOFT
2001
ACM
16 years 3 months ago
Using aspectC to improve the modularity of path-specific customization in operating system code
Layered architecture in operating system code is often compromised by execution path-specific customizations such as prefetching, page replacement and scheduling strategies. Paths...
Yvonne Coady, Gregor Kiczales, Michael J. Feeley, ...
86
Voted
ICSE
2007
IEEE-ACM
16 years 2 months ago
SoftGUESS: Visualization and Exploration of Code Clones in Context
We introduce SoftGUESS, a code clone exploration system. SoftGUESS is built on the more general GUESS system which provides users with a mechanism to interactively explore graph s...
Eytan Adar, Miryung Kim
ICSE
2009
IEEE-ACM
15 years 9 months ago
Predicting defects in SAP Java code: An experience report
Which components of a large software system are the most defect-prone? In a study on a large SAP Java system, we evaluated and compared a number of defect predictors, based on cod...
Tilman Holschuh, Markus Pauser, Kim Herzig, Thomas...
112
Voted
KBSE
2008
IEEE
15 years 9 months ago
Using n-grams to rapidly characterise the evolution of software code
Text-based approaches to the analysis of software evolution are attractive because of the fine-grained, token-level comparisons they can generate. The use of such approaches has, ...
Austen Rainer, Peter C. R. Lane, James A. Malcolm,...
118
Voted
SCAM
2008
IEEE
15 years 9 months ago
The Evolution and Decay of Statically Detected Source Code Vulnerabilities
The presence of vulnerable statements in the source code is a crucial problem for maintainers: properly monitoring and, if necessary, removing them is highly desirable to ensure h...
Massimiliano Di Penta, Luigi Cerulo, Lerina Aversa...