Sciweavers

2826 search results - page 511 / 566
» A resource-based analysis of IT sourcing
Sort
View
ICSE
2008
IEEE-ACM
14 years 10 months ago
Scalable detection of semantic clones
Several techniques have been developed for identifying similar code fragments in programs. These similar fragments, referred to as code clones, can be used to identify redundant c...
Mark Gabel, Lingxiao Jiang, Zhendong Su
SIGSOFT
2008
ACM
14 years 10 months ago
Improving robustness of evolving exceptional behaviour in executable models
Executable models are increasingly being employed by development teams to implement robust software systems. Modern executable models offer powerful composition mechanisms that al...
Alessandro Garcia, Nélio Cacho, Thomas Cott...
SIGSOFT
2005
ACM
14 years 10 months ago
Applying classification techniques to remotely-collected program execution data
There is an increasing interest in techniques that support measurement and analysis of fielded software systems. One of the main goals of these techniques is to better understand ...
Murali Haran, Alan F. Karr, Alessandro Orso, Adam ...
SIGSOFT
2005
ACM
14 years 10 months ago
Matching execution histories of program versions
We develop a method for matching dynamic histories of program executions of two program versions. The matches produced can be useful in many applications including software piracy...
Xiangyu Zhang, Rajiv Gupta
WWW
2009
ACM
14 years 10 months ago
Efficient overlap and content reuse detection in blogs and online news articles
The use of blogs to track and comment on real world (political, news, entertainment) events is growing. Similarly, as more individuals start relying on the Web as their primary in...
Jong Wook Kim, Jun'ichi Tatemura, K. Selçuk...