Sciweavers

289 search results - page 14 / 58
» Using Slicing to Identify Duplication in Source Code
Sort
View
ICSE
2009
IEEE-ACM
16 years 2 months ago
Safe-commit analysis to facilitate team software development
Software development teams exchange source code in shared repositories. These repositories are kept consistent by having developers follow a commit policy, such as "Program e...
Jan Wloka, Barbara G. Ryder, Frank Tip, Xiaoxia Re...
136
Voted
SP
2002
IEEE
161views Security Privacy» more  SP 2002»
15 years 1 months ago
Improving Computer Security Using Extended Static Checking
We describe a method for finding security flaws in source code by way of static analysis. The method is notable because it allows a user to specify a wide range of security proper...
Brian Chess
ESEM
2009
ACM
15 years 8 months ago
The evolution and impact of code smells: A case study of two open source systems
Code smells are design flaws in object-oriented designs that may lead to maintainability issues in the further evolution of the software system. This study focuses on the evolutio...
Steffen Olbrich, Daniela Cruzes, Victor R. Basili,...
WCET
2010
14 years 11 months ago
Hybrid measurement-based WCET analysis at the source level using object-level traces
Hybrid measurement-based approaches to worst-case execution time (WCET) analysis combine measured execution times of small program segments using static analysis of the larger sof...
Adam Betts, Nicholas Merriam, Guillem Bernat
SCAM
2007
IEEE
15 years 8 months ago
SQuAVisiT: A Software Quality Assessment and Visualisation Toolset
Software quality assessment of large COBOL industrial legacy systems, both for maintenance or migration purposes, mounts a serious challenge. We present the Software Quality Asses...
Serguei A. Roubtsov, Alexandru Telea, Danny Holten