Sciweavers

419 search results - page 17 / 84
» An Automated Approach for Identifying Potential Vulnerabilit...
Sort
View
ICSE
2004
IEEE-ACM
14 years 9 months ago
Automated Support for Development, Maintenance, and Testing in the Presence of Implicit Control Flow
Although object-oriented languages can improve programming practices, their characteristics may introduce new problems for software engineers. One important problem is the presenc...
Saurabh Sinha, Alessandro Orso, Mary Jean Harrold
SP
2008
IEEE
112views Security Privacy» more  SP 2008»
14 years 3 months ago
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications
Web applications are ubiquitous, perform missioncritical tasks, and handle sensitive user data. Unfortunately, web applications are often implemented by developers with limited se...
Davide Balzarotti, Marco Cova, Viktoria Felmetsger...
MSR
2010
ACM
13 years 10 months ago
Identifying security bug reports via text mining: An industrial case study
-- A bug-tracking system such as Bugzilla contains bug reports (BRs) collected from various sources such as development teams, testing teams, and end users. When bug reporters subm...
Michael Gegick, Pete Rotella, Tao Xie
CLUSTER
2007
IEEE
14 years 24 days ago
Identifying energy-efficient concurrency levels using machine learning
Abstract-- Multicore microprocessors have been largely motivated by the diminishing returns in performance and the increased power consumption of single-threaded ILP microprocessor...
Matthew Curtis-Maury, Karan Singh, Sally A. McKee,...
ICSM
2005
IEEE
14 years 2 months ago
Automated Refactoring of Object Oriented Code into Aspects
This paper presents a human–guided automated approach to refactoring object oriented programs to the aspect oriented paradigm. The approach is based upon the iterative applicati...
David Binkley, Mariano Ceccato, Mark Harman, Filip...