Sciweavers

889 search results - page 60 / 178
» Analysis of Software Engineering Data Using Computational In...
Sort
View
RE
2005
Springer
14 years 2 months ago
Contextual Risk Analysis for Interview Design
Interviews with stakeholders can be a useful method for identifying user needs and establishing requirements. However, interviews are also problematic. They are time consuming and...
Tira Cohene, Steve M. Easterbrook
ISSTA
2000
ACM
14 years 1 months ago
Which pointer analysis should I use?
During the past two decades many di erent pointer analysis algorithms have been published. Although some descriptions include measurements of the e ectiveness of the algorithm, qu...
Michael Hind, Anthony Pioli
VMCAI
2010
Springer
14 years 6 months ago
Shape Analysis with Reference Set Relations
Tracking subset relations between the contents containers on the heap is fundamental to modeling the semantics of many common programing idioms such as applying a function to a sub...
Mark Marron, Rupak Majumdar, Darko Stefanovic, Dee...
KBSE
2007
IEEE
14 years 3 months ago
Testing concurrent programs using value schedules
Concurrent programs are difficult to debug and verify because of the nondeterministic nature of concurrent executions. A particular concurrency-related bug may only show up under ...
Jun Chen, Steve MacDonald
ICSE
2009
IEEE-ACM
14 years 9 months ago
A toolset for automated failure analysis
Classic fault localization techniques can automatically provide information about the suspicious code blocks that are likely responsible for observed failures. This information is...
Fabrizio Pastore, Leonardo Mariani, Mauro Pezz&egr...