Sciweavers

8689 search results - page 133 / 1738
» Software: hard data
Sort
View
ICSM
2009
IEEE
15 years 2 months ago
An empirical study on the risks of using off-the-shelf techniques for processing mailing list data
Mailing list repositories contain valuable information about the history of a project. Research is starting to mine this information to support developers and maintainers of longl...
Nicolas Bettenburg, Emad Shihab, Ahmed E. Hassan
AOSD
2006
ACM
15 years 11 months ago
Using aspects to support the software process: XP over Eclipse
Usually, aspects enhance a software product by being composed - or woven - into it. Here, on the other hand, we use aspects to support the software development process itself. The...
Oren Mishali, Shmuel Katz
CC
2005
Springer
15 years 10 months ago
A Compiler-Based Approach to Data Security
Feihui Li, Guilin Chen, Mahmut T. Kandemir, Richar...
TACAS
2007
Springer
103views Algorithms» more  TACAS 2007»
15 years 11 months ago
A Reachability Predicate for Analyzing Low-Level Software
Reasoning about heap-allocated data structures such as linked lists and arrays is challenging. The reachability predicate has proved to be useful for reasoning about the heap in ty...
Shaunak Chatterjee, Shuvendu K. Lahiri, Shaz Qadee...
PKDD
2010
Springer
127views Data Mining» more  PKDD 2010»
15 years 2 months ago
Software-Defect Localisation by Mining Dataflow-Enabled Call Graphs
Defect localisation is essential in software engineering and is an important task in domain-specific data mining. Existing techniques building on call-graph mining can localise dif...
Frank Eichinger, Klaus Krogmann, Roland Klug, Klem...