Sciweavers

1911 search results - page 275 / 383
» Program analysis for code duplication in logic programs
Sort
View
IFIP
1994
Springer
15 years 9 months ago
The specification of business rules: A comparison of selected methodologies
Business rules are an important element of information systems. The notion business rule encompasses different phenomena; therefore, some classification criteria are presented and...
Holger Herbst, Gerhard Knolmayer, Thomas Myrach, M...
ACMSE
2004
ACM
15 years 8 months ago
Methods for the prevention, detection and removal of software security vulnerabilities
Over the past decade, the need to build secure software has become a dominant goal in software development. Consequently, software researchers and practitioners have identified wa...
Jay-Evan J. Tevis, John A. Hamilton Jr.
LISP
2008
104views more  LISP 2008»
15 years 4 months ago
On the implementation of automatic differentiation tools
Automatic differentiation is a semantic transformation that applies the rules of differential calculus to source code. It thus transforms a computer program that computes a mathema...
Christian H. Bischof, Paul D. Hovland, Boyana Norr...
SCAM
2008
IEEE
15 years 11 months ago
Exploiting the Correspondence between Micro Patterns and Class Names
This paper argues that semantic information encoded in natural language identifiers is a largely neglected resource for program analysis. First we show that words in Java class n...
Jeremy Singer, Chris C. Kirkham
ICSM
2006
IEEE
15 years 10 months ago
Reverse Engineering Method Stereotypes
An approach to automatically identify the stereotypes of all the methods in an entire system is presented. A taxonomy for object-oriented class method stereotypes is given that un...
Natalia Dragan, Michael L. Collard, Jonathan I. Ma...