Sciweavers

1406 search results - page 152 / 282
» Similarity in Programs
Sort
View
114
Voted
IFIP
2009
Springer
15 years 10 months ago
Towards a Type System for Security APIs
Security API analysis typically only considers a subset of an API’s functions, with results bounded by the number of function calls. Furthermore, attacks involving partial leakag...
Gavin Keighren, David Aspinall, Graham Steel
IVA
2009
Springer
15 years 10 months ago
A Probabilistic Model of Motor Resonance for Embodied Gesture Perception
Abstract. Basic communication and coordination mechanisms of human social interaction are assumed to be mediated by perception-action links. These links ground the observation and ...
Amir Sadeghipour, Stefan Kopp
132
Voted
SCAM
2008
IEEE
15 years 10 months ago
Fast and Precise Points-to Analysis
—Many software engineering applications require points-to analysis. Client applications range from optimizing compilers to program development and testing environments to reverse...
Jonas Lundberg, Tobias Gutzmann, Welf Löwe
141
Voted
SCAM
2007
IEEE
15 years 10 months ago
Toward an Implementation of the "Form Template Method" Refactoring
This paper presents an implementation of the “form template method” refactoring. This transformation has not been automated yet, but has many similarities with other transform...
Nicolas Juillerat, Béat Hirsbrunner
111
Voted
SEFM
2007
IEEE
15 years 10 months ago
Supporting Proof in a Reactive Development Environment
Reactive integrated development environments for software engineering have lead to an increase in productivity and quality of programs produced. They have done so by replacing the...
Farhad Mehta