Sciweavers

478 search results - page 49 / 96
» Working Effectively with Legacy Code
Sort
View
SIGSOFT
2003
ACM
16 years 4 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler
ICSE
2009
IEEE-ACM
16 years 4 months ago
Modular string-sensitive permission analysis with demand-driven precision
In modern software systems, programs are obtained by dynamically assembling components. This has made it necessary to subject component providers to access-control restrictions. W...
Emmanuel Geay, Marco Pistoia, Takaaki Tateishi, Ba...
MSR
2005
ACM
15 years 8 months ago
Mining student CVS repositories for performance indicators
Over 200 CVS repositories representing the assignments of students in a second year undergraduate computer science course have been assembled. This unique data set represents many...
Keir Mierle, Kevin Laven, Sam T. Roweis, Greg Wils...
GLOBECOM
2009
IEEE
15 years 10 months ago
Channel Orthogonalizing Precoder for Open-Loop QO-STBC Systems
—This paper proposes a new preprocessing scheme for rate-one quasi-orthogonal space-time block code (QO-STBC), which requires no channel state information at the transmitter. We ...
Heejin Kim, Heunchul Lee, Inkyu Lee
145
Voted
ICSM
2005
IEEE
15 years 8 months ago
Rapid "Crash Testing" for Continuously Evolving GUI-Based Software Applications
Several rapid-feedback-based quality assurance mechanisms are used to manage the quality of continuously evolving software. Even though graphical user interfaces (GUIs) are one of...
Qing Xie, Atif M. Memon