Sciweavers

3316 search results - page 418 / 664
» Mining Software Engineering Data
Sort
View
WSCG
2004
117views more  WSCG 2004»
15 years 4 months ago
A Supply-Chain for Computer-Mediated Communication and Visualization
The paper specifies modular software for synchronous and asynchronous computer-mediated communication and visualization in network-distributed environments. It is new because the ...
Nils Jensen, Ralf Einhorn, Gabriele von Voigt
ICDM
2008
IEEE
107views Data Mining» more  ICDM 2008»
15 years 9 months ago
Graph-Based Iterative Hybrid Feature Selection
When the number of labeled examples is limited, traditional supervised feature selection techniques often fail due to sample selection bias or unrepresentative sample problem. To ...
ErHeng Zhong, Sihong Xie, Wei Fan, Jiangtao Ren, J...
SIGSOFT
2007
ACM
16 years 3 months ago
Efficient token based clone detection with flexible tokenization
Code clones are similar code fragments that occur at multiple locations in a software system. Detection of code clones provides useful information for maintenance, reengineering, ...
Hamid Abdul Basit, Stan Jarzabek
SIGSOFT
2004
ACM
16 years 3 months ago
Testing static analysis tools using exploitable buffer overflows from open source code
Five modern static analysis tools (ARCHER, BOON, PolySpace C Verifier, Splint, and UNO) were evaluated using source code examples containing 14 exploitable buffer overflow vulnera...
Misha Zitser, Richard Lippmann, Tim Leek
ISSTA
2009
ACM
15 years 9 months ago
HAMPI: a solver for string constraints
Many automatic testing, analysis, and verification techniques for programs can be effectively reduced to a constraint-generation phase followed by a constraint-solving phase. Th...
Adam Kiezun, Vijay Ganesh, Philip J. Guo, Pieter H...