Sciweavers

1128 search results - page 118 / 226
» Little Engines of Proof
Sort
View
112
Voted
ESSOS
2009
Springer
15 years 7 months ago
Report: Extensibility and Implementation Independence of the .NET Cryptographic API
Abstract. When a vulnerability is discovered in a cryptographic algorithm, or in a specific implementation of that algorithm, it is important that software using that algorithm or...
Pieter Philippaerts, Cédric Boon, Frank Pie...
82
Voted
ICSE
2009
IEEE-ACM
15 years 7 months ago
Automatically capturing source code context of NL-queries for software maintenance and reuse
As software systems continue to grow and evolve, locating code for maintenance and reuse tasks becomes increasingly difficult. Existing static code search techniques using natura...
Emily Hill, Lori L. Pollock, K. Vijay-Shanker
ICSE
2009
IEEE-ACM
15 years 7 months ago
Automated substring hole analysis
Code coverage is a common measure for quantitatively assessing the quality of software testing. Code coverage indicates the fraction of code that is actually executed by tests in ...
Yoram Adler, Eitan Farchi, Moshe Klausner, Dan Pel...
88
Voted
WCRE
2009
IEEE
15 years 7 months ago
Autumn Leaves: Curing the Window Plague in IDEs
—Navigating large software systems is difficult as the various artifacts are distributed in a huge space, while the relationships between different artifacts often remain hidden...
David Röthlisberger, Oscar Nierstrasz, St&eac...
104
Voted
ICSM
2009
IEEE
15 years 7 months ago
Understanding source package organization using the hybrid model
Within a large, object-oriented software system it is common to partition the classes into a set of packages, which implicitly serve as a set of coarsely-grained logical design un...
Xinyi Dong, Michael W. Godfrey