Sciweavers

ICSE
2012
IEEE-ACM
11 years 6 months ago
A bidirectional model-driven spreadsheet environment
Abstract—In this extended abstract we present a bidirectional model-driven framework to develop spreadsheets. By being model driven, our approach allows to evolve a spreadsheet m...
Jácome Cunha, João Paulo Fernandes, ...
ICSE
2012
IEEE-ACM
11 years 6 months ago
Engineering and verifying requirements for programmable self-assembling nanomachines
—We propose an extension of van Lamsweerde’s goal-oriented requirements engineering to the domain of programmable DNA nanotechnology. This is a domain in which individual devic...
Robyn R. Lutz, Jack H. Lutz, James I. Lathrop, Tit...
ICSE
2012
IEEE-ACM
11 years 6 months ago
Industrial application of concolic testing approach: A case study on libexif by using CREST-BV and KLEE
—As smartphones become popular, manufacturers such as Samsung Electronics are developing smartphones with rich functionality such as a camera and photo editing quickly, which acc...
Yunho Kim, Moonzoo Kim, Young Joo Kim, Yoonkyu Jan...
ICSE
2012
IEEE-ACM
11 years 6 months ago
A large scale exploratory analysis of software vulnerability life cycles
Abstract—Software systems inherently contain vulnerabilities that have been exploited in the past resulting in significant revenue losses. The study of vulnerability life cycles...
Muhammad Shahzad, Muhammad Zubair Shafiq, Alex X. ...
ICSE
2012
IEEE-ACM
11 years 6 months ago
Axis: Automatically fixing atomicity violations through solving control constraints
Abstract—Atomicity, a general correctness criterion in concurrency programs, is often violated in real-world applications. The violations are difficult for developers to fix, m...
Peng Liu, Charles Zhang
ICSE
2012
IEEE-ACM
11 years 6 months ago
Where should the bugs be fixed? More accurate information retrieval-based bug localization based on bug reports
—For a large and evolving software system, the project team could receive a large number of bug reports. Locating the source code files that need to be changed in order to fix th...
Jian Zhou, Hongyu Zhang, David Lo
ICSE
2012
IEEE-ACM
11 years 6 months ago
Detecting similar software applications
—Although popular text search engines allow users to retrieve similar web pages, source code search engines do not have this feature. Detecting similar applications is a notoriou...
Collin McMillan, Mark Grechanik, Denys Poshyvanyk
ICSE
2012
IEEE-ACM
11 years 6 months ago
Characterizing logging practices in open-source software
—Software logging is a conventional programming practice. While its efficacy is often important for users and developers to understand what have happened in the production run, ...
Ding Yuan, Soyeon Park, Yuanyuan Zhou
ICSE
2012
IEEE-ACM
11 years 6 months ago
WitchDoctor: IDE support for real-time auto-completion of refactorings
—Integrated Development Environments (IDEs) have come to perform a wide variety of tasks on behalf of the programmer, refactoring being a classic example. These operations have u...
Stephen R. Foster, William G. Griswold, Sorin Lern...