Sciweavers

2631 search results - page 253 / 527
» Software Development with Code Maps
Sort
View
132
Voted
ICST
2009
IEEE
15 years 10 months ago
Predicting Attack-prone Components
GEGICK, MICHAEL CHARLES. Predicting Attack-prone Components with Source Code Static Analyzers. (Under the direction of Laurie Williams). No single vulnerability detection techniqu...
Michael Gegick, Pete Rotella, Laurie A. Williams
132
Voted
ICST
2008
IEEE
15 years 10 months ago
A JML Compiler Based on AspectJ
The Java Modeling Language (JML) is a behavioral interface specification language (BISL) designed for Java. It was developed with the aim of improving the functional software cor...
Henrique Rebêlo, Ricardo Massa Ferreira Lima...
138
Voted
CSMR
2009
IEEE
15 years 8 months ago
Discovering Comprehension Pitfalls in Class Hierarchies
Despite many advances in program comprehension, polymorphism and inheritance are still the cause of many misunderstandings in object-oriented code. In this paper, we present a sui...
Petru Florin Mihancea, Radu Marinescu
154
Voted
AGTIVE
2007
Springer
15 years 7 months ago
Specifying Domain-Specific Refactorings for AndroMDA Based on Graph Transformation
Abstract. Applying refactoring in a model-driven software engineering context raises many new challenges that need to be addressed. In this paper, we consider model-driven software...
Gabriele Taentzer, Dirk Müller 0002, Tom Mens
115
Voted
SIGSOFT
2010
ACM
15 years 1 months ago
LINKSTER: enabling efficient manual inspection and annotation of mined data
While many uses of mined software engineering data are automatic in nature, some techniques and studies either require, or can be improved, by manual methods. Unfortunately, manua...
Christian Bird, Adrian Bachmann, Foyzur Rahman, Ab...