Sciweavers

172 search results - page 25 / 35
» Extracting Source Code from E-Mails
Sort
View
80
Voted
PLDI
2010
ACM
15 years 7 months ago
Type-preserving Compilation for End-to-end Verification of Security Enforcement
A number of programming languages use rich type systems to verify security properties of code. Some of these languages are meant for source programming, but programs written in th...
Juan Chen, Ravi Chugh, Nikhil Swamy
ICSE
1998
IEEE-ACM
15 years 1 months ago
A Model of Noisy Software Engineering Data (Status Report)
other projects in the database. Software development data is highly variable, which often result,s in underlying trends being hidden. In order to address this problem, a method of ...
Roseanne Tesoriero, Marvin V. Zelkowitz
SPIN
2000
Springer
15 years 1 months ago
A Language Framework for Expressing Checkable Properties of Dynamic Software
Research on how to reason about correctness properties of software systems using model checking is advancing rapidly. Work on exnite-state models from program source code and on ab...
James C. Corbett, Matthew B. Dwyer, John Hatcliff,...
69
Voted
CASCON
1996
77views Education» more  CASCON 1996»
14 years 11 months ago
Harvesting design for an application framework
Framework design begins with domain analysis. Either the problem domain is analyzed to create a new design, or the solution domain is analyzed to understand how the problem has al...
Joan Boone
HOTOS
2007
IEEE
15 years 1 months ago
HotComments: How to Make Program Comments More Useful?
Program comments have long been used as a common practice for improving inter-programmer communication and code readability, by explicitly specifying programmers' intentions ...
Lin Tan, Ding Yuan, Yuanyuan Zhou