Sciweavers

580 search results - page 114 / 116
» Studying the History of Ideas Using Topic Models
Sort
View
SIGSOFT
2008
ACM
15 years 10 months ago
Marple: a demand-driven path-sensitive buffer overflow detector
Despite increasing efforts in detecting and managing software security vulnerabilities, the number of security attacks is still rising every year. As software becomes more complex...
Wei Le, Mary Lou Soffa
APSEC
2003
IEEE
15 years 2 months ago
Understanding How the Requirements Are Implemented in Source Code
For software maintenance and evolution, a common problem is to understand how each requirement is implemented in the source code. The basic solution of this problem is to find the...
Wei Zhao, Lu Zhang, Yin Liu, Jing Luo, Jiasu Sun
TAP
2008
Springer
93views Hardware» more  TAP 2008»
14 years 9 months ago
Pex-White Box Test Generation for .NET
Pex automatically produces a small test suite with high code coverage for a .NET program. To this end, Pex performs a systematic program analysis (using dynamic symbolic execution,...
Nikolai Tillmann, Jonathan de Halleux
CHI
2003
ACM
15 years 10 months ago
Sense and sensibility: evaluation and interactive art
HCI evaluation methods are useful for improving the design of interactive systems, yet they may be rejected by nontraditional technology disciplines such as media art. We have dev...
Gerd Andersson, Kristina Höök, Phoebe Se...
WWW
2010
ACM
15 years 4 months ago
Entity relation discovery from web tables and links
The World-Wide Web consists not only of a huge number of unstructured texts, but also a vast amount of valuable structured data. Web tables [2] are a typical type of structured in...
Cindy Xide Lin, Bo Zhao, Tim Weninger, Jiawei Han,...