Sciweavers

3456 search results - page 139 / 692
» Byte Code Engineering
Sort
View
112
Voted
SIGSOFT
2001
ACM
16 years 5 months ago
Using aspectC to improve the modularity of path-specific customization in operating system code
Layered architecture in operating system code is often compromised by execution path-specific customizations such as prefetching, page replacement and scheduling strategies. Paths...
Yvonne Coady, Gregor Kiczales, Michael J. Feeley, ...
ICSE
2007
IEEE-ACM
16 years 4 months ago
SoftGUESS: Visualization and Exploration of Code Clones in Context
We introduce SoftGUESS, a code clone exploration system. SoftGUESS is built on the more general GUESS system which provides users with a mechanism to interactively explore graph s...
Eytan Adar, Miryung Kim
ICSE
2009
IEEE-ACM
15 years 11 months ago
Predicting defects in SAP Java code: An experience report
Which components of a large software system are the most defect-prone? In a study on a large SAP Java system, we evaluated and compared a number of defect predictors, based on cod...
Tilman Holschuh, Markus Pauser, Kim Herzig, Thomas...
129
Voted
KBSE
2008
IEEE
15 years 11 months ago
Using n-grams to rapidly characterise the evolution of software code
Text-based approaches to the analysis of software evolution are attractive because of the fine-grained, token-level comparisons they can generate. The use of such approaches has, ...
Austen Rainer, Peter C. R. Lane, James A. Malcolm,...
135
Voted
SCAM
2008
IEEE
15 years 11 months ago
The Evolution and Decay of Statically Detected Source Code Vulnerabilities
The presence of vulnerable statements in the source code is a crucial problem for maintainers: properly monitoring and, if necessary, removing them is highly desirable to ensure h...
Massimiliano Di Penta, Luigi Cerulo, Lerina Aversa...