Sciweavers

3330 search results - page 248 / 666
» software 2010
Sort
View
ICSE
2010
IEEE-ACM
15 years 2 months ago
Linking e-mails and source code artifacts
E-mails concerning the development issues of a system constitute an important source of information about high-level design decisions, low-level implementation concerns, and the s...
Alberto Bacchelli, Michele Lanza, Romain Robbes
ISSTA
2010
ACM
15 years 2 months ago
Causal inference for statistical fault localization
This paper investigates the application of causal inference methodology for observational studies to software fault localization based on test outcomes and profiles. This methodo...
George K. Baah, Andy Podgurski, Mary Jean Harrold
115
Voted
KBSE
2010
IEEE
14 years 11 months ago
Analyzing security architectures
We present a semi-automated approach, Secoria, for analyzing a security runtime architecture for security and for conformance to an object-oriented implementation. Typecheckable a...
Marwan Abi-Antoun, Jeffrey M. Barnes
113
Voted
CISIS
2010
IEEE
15 years 7 months ago
CANDEL: Product Line Based Dynamic Context Management for Pervasive Applications
— In pervasive environment, it is essential for computing applications to be context-aware. However, one of the major challenges is the establishment of a generic and dynamic con...
Zakwan Jaroucheh, Xiaodong Liu, Sally Smith
ISSTA
2010
ACM
15 years 4 months ago
N-version disassembly: differential testing of x86 disassemblers
The output of a disassembler is used for many different purposes (e.g., debugging and reverse engineering). Therefore, disassemblers represent the first link of a long chain of s...
Roberto Paleari, Lorenzo Martignoni, Giampaolo Fre...