Sciweavers

478 search results - page 49 / 96
» Working Effectively with Legacy Code
Sort
View
SIGSOFT
2003
ACM
15 years 10 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler
ICSE
2009
IEEE-ACM
15 years 10 months ago
Modular string-sensitive permission analysis with demand-driven precision
In modern software systems, programs are obtained by dynamically assembling components. This has made it necessary to subject component providers to access-control restrictions. W...
Emmanuel Geay, Marco Pistoia, Takaaki Tateishi, Ba...
MSR
2005
ACM
15 years 3 months ago
Mining student CVS repositories for performance indicators
Over 200 CVS repositories representing the assignments of students in a second year undergraduate computer science course have been assembled. This unique data set represents many...
Keir Mierle, Kevin Laven, Sam T. Roweis, Greg Wils...
GLOBECOM
2009
IEEE
15 years 4 months ago
Channel Orthogonalizing Precoder for Open-Loop QO-STBC Systems
—This paper proposes a new preprocessing scheme for rate-one quasi-orthogonal space-time block code (QO-STBC), which requires no channel state information at the transmitter. We ...
Heejin Kim, Heunchul Lee, Inkyu Lee
ICSM
2005
IEEE
15 years 3 months ago
Rapid "Crash Testing" for Continuously Evolving GUI-Based Software Applications
Several rapid-feedback-based quality assurance mechanisms are used to manage the quality of continuously evolving software. Even though graphical user interfaces (GUIs) are one of...
Qing Xie, Atif M. Memon