Sciweavers

2572 search results - page 496 / 515
» codes 2008
Sort
View
ICSE
2008
IEEE-ACM
15 years 11 months ago
Predicting accurate and actionable static analysis warnings: an experimental approach
Static analysis tools report software defects that may or may not be detected by other verification methods. Two challenges complicating the adoption of these tools are spurious f...
Joseph R. Ruthruff, John Penix, J. David Morgentha...
ICSE
2008
IEEE-ACM
15 years 11 months ago
Are fit tables really talking?: a series of experiments to understand whether fit tables are useful during evolution tasks
Test-driven software development tackles the problem of operationally defining the features to be implemented by means of test cases. This approach was recently ported to the earl...
Filippo Ricca, Massimiliano Di Penta, Marco Torchi...
ICSE
2008
IEEE-ACM
15 years 11 months ago
Clone detection in automotive model-based development
Model-based development is becoming an increasingly common development methodology. In important domains like embedded systems already major parts of the code are generated from m...
Benjamin Hummel, Bernhard Schätz, Elmar J&uum...
SIGSOFT
2008
ACM
15 years 11 months ago
Marple: a demand-driven path-sensitive buffer overflow detector
Despite increasing efforts in detecting and managing software security vulnerabilities, the number of security attacks is still rising every year. As software becomes more complex...
Wei Le, Mary Lou Soffa
WWW
2008
ACM
15 years 11 months ago
Better abstractions for secure server-side scripting
bstractions for Secure Server-Side Scripting Dachuan Yu Ajay Chander Hiroshi Inamura Igor Serikov DoCoMo Communications Laboratories USA 3240 Hillview Avenue Palo Alto, CA 94304 {y...
Dachuan Yu, Ajay Chander, Hiroshi Inamura, Igor Se...