Sciweavers

3456 search results - page 242 / 692
» Byte Code Engineering
Sort
View
123
Voted
SIGSOFT
2005
ACM
16 years 4 months ago
Context- and path-sensitive memory leak detection
We present a context- and path-sensitive algorithm for detecting memory leaks in programs with explicit memory management. Our leak detection algorithm is based on an underlying e...
Yichen Xie, Alexander Aiken
133
Voted
ECLIPSE
2005
ACM
15 years 5 months ago
ConcernMapper: simple view-based separation of scattered concerns
We introduce ConcernMapper, an Eclipse plug-in for experimenting with techniques for advanced separation of concerns. ConcernMapper supports development and maintenance tasks invo...
Martin P. Robillard, Frédéric Weigan...
204
Voted
FASE
2012
Springer
13 years 11 months ago
Integration Testing of Software Product Lines Using Compositional Symbolic Execution
Software product lines are families of products defined by feature commonality and variability, with a well-managed asset base. Recent work in testing of software product lines ha...
Jiangfan Shi, Myra B. Cohen, Matthew B. Dwyer
167
Voted
FASE
2012
Springer
13 years 11 months ago
Cohesive and Isolated Development with Branches
The adoption of distributed version control (DVC), such as Git and Mercurial, in open-source software (OSS) projects has been explosive. Why is this and how are projects using DVC?...
Earl T. Barr, Christian Bird, Peter C. Rigby, Abra...
159
Voted
EMSOFT
2011
Springer
14 years 3 months ago
Model-checking behavioral programs
System specifications are often structured as collections of scenarios and use-cases that describe desired and forbidden sequences of events. A recently proposed behavioral progr...
David Harel, Robby Lampert, Assaf Marron, Gera Wei...