Sciweavers

889 search results - page 22 / 178
» Analysis of Software Engineering Data Using Computational In...
Sort
View
ISSTA
2010
ACM
13 years 10 months ago
Analysis of invariants for efficient bounded verification
SAT-based bounded verification of annotated code consists of translating the code together with the annotations to a propositional formula, and analyzing the formula for specifica...
Juan P. Galeotti, Nicolás Rosner, Carlos L&...
ICSE
2010
IEEE-ACM
14 years 1 months ago
An analysis of the variability in forty preprocessor-based software product lines
Over 30 years ago, the preprocessor cpp was developed to extend the programming language C by lightweight metaprogramming capabilities. Despite its error-proneness and low ion lev...
Jörg Liebig, Sven Apel, Christian Lengauer, C...
ISSRE
2010
IEEE
13 years 7 months ago
A Large-Scale Industrial Case Study on Architecture-Based Software Reliability Analysis
—Architecture-based software reliability analysis methods shall help software architects to identify critical software components and to quantify their influence on the system r...
Heiko Koziolek, Bastian Schlich, Carlos G. Bilich
MICRO
2009
IEEE
326views Hardware» more  MICRO 2009»
14 years 3 months ago
DDT: design and evaluation of a dynamic program analysis for optimizing data structure usage
Data structures define how values being computed are stored and accessed within programs. By recognizing what data structures are being used in an application, tools can make app...
Changhee Jung, Nathan Clark
DRM
2007
Springer
14 years 2 months ago
Slicing obfuscations: design, correctness, and evaluation
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...