Sciweavers

787 search results - page 20 / 158
» Source code analysis and manipulation
Sort
View
ICFEM
2010
Springer
14 years 8 months ago
Verifying Heap-Manipulating Programs with Unknown Procedure Calls
Abstract. Verification of programs with invocations to unknown procedures is a practical problem, because in many scenarios not all codes of programs to be verified are available...
Shengchao Qin, Chenguang Luo, Guanhua He, Florin C...
78
Voted
FMCAD
2009
Springer
15 years 4 months ago
Decision diagrams for linear arithmetic
—Boolean manipulation and existential quantification of numeric variables from linear arithmetic (LA) formulas is at the core of many program analysis and software model checkin...
Sagar Chaki, Arie Gurfinkel, Ofer Strichman
ICSE
1998
IEEE-ACM
15 years 1 months ago
Conceptual Module Querying for Software Reengineering
Many tools have been built to analyze source code. Most of these tools do not adequately support reengineering activities because they do not allow a software engineer to simultan...
Elisa L. A. Baniassad, Gail C. Murphy
IJDE
2007
123views more  IJDE 2007»
14 years 9 months ago
Identifying Authorship by Byte-Level N-Grams: The Source Code Author Profile (SCAP) Method
Source code author identification deals with identifying the most likely author of a computer program, given a set of predefined author candidates. There are several scenarios whe...
Georgia Frantzeskou, Efstathios Stamatatos, Stefan...
HICSS
2007
IEEE
130views Biometrics» more  HICSS 2007»
15 years 4 months ago
Analysis of Activity in the Open Source Software Development Community
— Open Source Software is computer software for which the source code is publicly open for inspection, modification, and redistribution. While research of a few, large, successf...
Scott Christley, Gregory R. Madey