Sciweavers

3889 search results - page 560 / 778
» The Use of Program Dependence Graphs in Software Engineering
Sort
View
CCS
2010
ACM
15 years 4 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
110
Voted
FOSSACS
2007
Springer
15 years 10 months ago
Polynomial Constraints for Sets with Cardinality Bounds
Abstract. Logics that can reason about sets and their cardinality bounds are useful in program analysis, program verification, databases, and knowledge bases. This paper presents ...
Bruno Marnette, Viktor Kuncak, Martin C. Rinard
123
Voted
MSR
2006
ACM
15 years 10 months ago
Enriching revision history with interactions
Revision history provides a rich source of information to improve the understanding of changes made to programs, but it yields only limited insight into how these changes occurred...
Chris Parnin, Carsten Görg, Spencer Rugaber
130
Voted
OOPSLA
2005
Springer
15 years 10 months ago
CodeQuest: querying source code with datalog
We describe CodeQuest, a system for querying source code. It combines two previous proposals, namely the use of logic programming and database system. Experiments (on projects ran...
Elnar Hajiyev, Mathieu Verbaere, Oege de Moor, Kri...
ITICSE
2004
ACM
15 years 10 months ago
Experiences with teaching design patterns
In this paper, we present an assignment for a course on Design patterns at the masters level, where students have to adapt an existing program to meet additional requirements. We ...
Sylvia Stuurman, Gert Florijn