Sciweavers

1077 search results - page 162 / 216
» Introducing Software Engineering by means of Extreme Program...
Sort
View
ISSTA
2012
ACM
13 years 6 months ago
Static memory leak detection using full-sparse value-flow analysis
We introduce a static detector, Saber, for detecting memory leaks in C programs. Leveraging recent advances on sparse pointer analysis, Saber is the first to use a full-sparse va...
Yulei Sui, Ding Ye, Jingling Xue
ADAEUROPE
2000
Springer
15 years 8 months ago
On Persistent and Reliable Streaming in Ada
Saving internal program data for further use is one of the most useful ideas in programming. Developing general features to provide such data saving/ restoring is a very active res...
Jörg Kienzle, Alexander B. Romanovsky
153
Voted
ISSTA
2006
ACM
15 years 10 months ago
Towards supporting the architecture design process through evaluation of design alternatives
This paper addresses issues involved when an architect explore alternative designs including non-functional requirements; in our approach, non-functional requirements are expresse...
Lihua Xu, Scott A. Hendrickson, Eric Hettwer, Hada...
PEPM
2010
ACM
16 years 29 days ago
Context-sensitive analysis of obfuscated x86 executables
A method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations is presented. Such binaries may use operators to directly manipul...
Arun Lakhotia, Davidson R. Boccardo, Anshuman Sing...
DEXAW
2007
IEEE
104views Database» more  DEXAW 2007»
15 years 10 months ago
An MDA Approach to Implement Personal IR Tools
We introduce TIRA1 , a software architecture for the rapid prototyping of tailored information retrieval (IR) tools. TIRA allows to compose personal IR tools from atomic IR servic...
Sven Meyer zu Eissen, Benno Stein