Sciweavers

1911 search results - page 275 / 383
» Program analysis for code duplication in logic programs
Sort
View
IFIP
1994
Springer
15 years 6 months ago
The specification of business rules: A comparison of selected methodologies
Business rules are an important element of information systems. The notion business rule encompasses different phenomena; therefore, some classification criteria are presented and...
Holger Herbst, Gerhard Knolmayer, Thomas Myrach, M...
ACMSE
2004
ACM
15 years 6 months ago
Methods for the prevention, detection and removal of software security vulnerabilities
Over the past decade, the need to build secure software has become a dominant goal in software development. Consequently, software researchers and practitioners have identified wa...
Jay-Evan J. Tevis, John A. Hamilton Jr.
LISP
2008
104views more  LISP 2008»
15 years 2 months ago
On the implementation of automatic differentiation tools
Automatic differentiation is a semantic transformation that applies the rules of differential calculus to source code. It thus transforms a computer program that computes a mathema...
Christian H. Bischof, Paul D. Hovland, Boyana Norr...
SCAM
2008
IEEE
15 years 9 months ago
Exploiting the Correspondence between Micro Patterns and Class Names
This paper argues that semantic information encoded in natural language identifiers is a largely neglected resource for program analysis. First we show that words in Java class n...
Jeremy Singer, Chris C. Kirkham
ICSM
2006
IEEE
15 years 8 months ago
Reverse Engineering Method Stereotypes
An approach to automatically identify the stereotypes of all the methods in an entire system is presented. A taxonomy for object-oriented class method stereotypes is given that un...
Natalia Dragan, Michael L. Collard, Jonathan I. Ma...