Sciweavers

15777 search results - page 2712 / 3156
» The Reformulation-Optimization Software Engine
Sort
View
ISSTA
2009
ACM
15 years 11 months ago
Exception analysis and points-to analysis: better together
Exception analysis and points-to analysis are typically done in complete separation. Past algorithms for precise exception analysis (e.g., pairing throw clauses with catch stateme...
Martin Bravenboer, Yannis Smaragdakis
ISSTA
2009
ACM
15 years 11 months ago
Automatic system testing of programs without test oracles
Metamorphic testing has been shown to be a simple yet effective technique in addressing the quality assurance of applications that do not have test oracles, i.e., for which it is ...
Christian Murphy, Kuang Shen, Gail E. Kaiser
ISSTA
2009
ACM
15 years 11 months ago
A comparative study of programmer-written and automatically inferred contracts
Where do contracts — specification elements embedded in executable code — come from? To produce them, should we rely on the programmers, on automatic tools, or some combinati...
Nadia Polikarpova, Ilinca Ciupa, Bertrand Meyer
MSR
2009
ACM
15 years 11 months ago
The promises and perils of mining git
We are now witnessing the rapid growth of decentralized source code management (DSCM) systems, in which every developer has her own repository. DSCMs facilitate a style of collabo...
Christian Bird, Peter C. Rigby, Earl T. Barr, Davi...
141
Voted
UIST
2009
ACM
15 years 11 months ago
Using fNIRS brain sensing in realistic HCI settings: experiments and guidelines
Because functional near-infrared spectroscopy (fNIRS) eases many of the restrictions of other brain sensors, it has potential to open up new possibilities for HCI research. From o...
Erin Treacy Solovey, Audrey Girouard, Krysta Chaun...
« Prev « First page 2712 / 3156 Last » Next »