Sciweavers

418 search results - page 20 / 84
» GUI Inspection from Source Code Analysis
Sort
View
ICCAD
2005
IEEE
121views Hardware» more  ICCAD 2005»
15 years 6 months ago
Transition-by-transition FSM traversal for reachability analysis in bounded model checking
Abstract— In bounded model checking (BMC)-based verification flows lack of reachability constraints often leads to false negatives. At present, it is daily practice of a veri...
Minh D. Nguyen, Dominik Stoffel, Markus Wedler, Wo...
CSMR
2005
IEEE
15 years 3 months ago
An XML-Based Framework for Language Neutral Program Representation and Generic Analysis
XML applications are becoming increasingly popular to define structured or semi-structured constrained data in XML for special application areas. In pursuit there is a growing mom...
Raihan Al-Ekram, Kostas Kontogiannis
IWPC
2009
IEEE
15 years 4 months ago
Who can help me with this change request?
An approach to recommend a ranked list of developers to assist in performing software changes given a textual change request is presented. The approach employs a two-fold strategy...
Huzefa H. Kagdi, Denys Poshyvanyk
CSMR
2007
IEEE
15 years 3 months ago
How Clones are Maintained: An Empirical Study
Despite the conventional wisdom concerning the risks related to the use of source code cloning as a software development strategy, several studies appeared in literature indicated...
Lerina Aversano, Luigi Cerulo, Massimiliano Di Pen...
ICSE
1999
IEEE-ACM
15 years 1 months ago
CHIME: Customizable Hyperlink Insertion and Maintenance Engine for Software Engineering Environments
Source code browsing is an important part of program comprehension. Browsers expose semantic and syntactic relationships (such as between object references and definitions) in GU...
Premkumar T. Devanbu, Yih-Farn Chen, Emden R. Gans...