Sciweavers

418 search results - page 76 / 84
» GUI Inspection from Source Code Analysis
Sort
View
ISORC
1999
IEEE
15 years 3 months ago
Prediction of Fault-proneness at Early Phase in Object-Oriented Development
To analyze the complexity of object-oriented software, several metrics have been proposed. Among them, Chidamber and Kemerer's metrics are well-known ones as object-oriented ...
Toshihiro Kamiya, Shinji Kusumoto, Katsuro Inoue
DSN
2008
IEEE
15 years 1 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
TSE
2008
113views more  TSE 2008»
14 years 11 months ago
Discovering Neglected Conditions in Software by Mining Dependence Graphs
Neglected conditions are an important but difficult-to-find class of software defects. This paper presents a novel approach for revealing neglected conditions that integrates stati...
Ray-Yaung Chang, Andy Podgurski, Jiong Yang
JMLR
2010
152views more  JMLR 2010»
14 years 6 months ago
The SHOGUN Machine Learning Toolbox
We have developed a machine learning toolbox, called SHOGUN, which is designed for unified large-scale learning for a broad range of feature types and learning settings. It offers...
Sören Sonnenburg, Gunnar Rätsch, Sebasti...
ICC
2007
IEEE
214views Communications» more  ICC 2007»
15 years 6 months ago
Distributed ONS and its Impact on Privacy
— The EPC Network is an industry proposal to build a global information architecture for objects carrying RFID tags with Electronic Product Codes (EPC). A so-called Object Naming...
Benjamin Fabian, Oliver Günther