Sciweavers

268 search results - page 42 / 54
» The future of research in free open source software developm...
Sort
View
GECCO
2007
Springer
206views Optimization» more  GECCO 2007»
15 years 1 months ago
Using code metric histograms and genetic algorithms to perform author identification for software forensics
We have developed a technique to characterize software developers' styles using a set of source code metrics. This style fingerprint can be used to identify the likely author...
Robert Charles Lange, Spiros Mancoridis
ICSE
2000
IEEE-ACM
15 years 1 months ago
Software engineering for security: a roadmap
Is there such a thing anymore as a software system that doesn't need to be secure? Almost every softwarecontrolled system faces threats from potential adversaries, from Inter...
Premkumar T. Devanbu, Stuart G. Stubblebine
CAV
2008
Springer
139views Hardware» more  CAV 2008»
14 years 11 months ago
CSIsat: Interpolation for LA+EUF
We present CSIsat, an interpolating decision procedure for the quantifier-free theory of rational linear arithmetic and equality with uninterpreted function symbols. Our implementa...
Dirk Beyer, Damien Zufferey, Rupak Majumdar
WCRE
2009
IEEE
15 years 4 months ago
An Empirical Study on Inconsistent Changes to Code Clones at Release Level
—Current research on code clones tries to address the question whether or not code clones are harmful for the quality of software. As most of these studies are based on the fine...
Nicolas Bettenburg, Weiyi Shang, Walid Ibrahim, Br...
HICSS
2009
IEEE
135views Biometrics» more  HICSS 2009»
15 years 4 months ago
The Role of Social Capital in the Creation of Community Wireless Networks
Community wireless networks (CWNs) offer free or affordable Internet access for the purpose of improving the well-being of the community. Many questions have been raised about the...
Abdelnasser Abdelaal, Hesham H. Ali, Deepak Khazan...