Sciweavers

2878 search results - page 89 / 576
» Analyzing the Uses of a Software Modeling Tool
Sort
View
SIGSOFT
2008
ACM
14 years 9 months ago
Marple: a demand-driven path-sensitive buffer overflow detector
Despite increasing efforts in detecting and managing software security vulnerabilities, the number of security attacks is still rising every year. As software becomes more complex...
Wei Le, Mary Lou Soffa
HICSS
2002
IEEE
109views Biometrics» more  HICSS 2002»
14 years 1 months ago
Monitoring Software Requirements Using Instrumented Code
Ideally, software is derived from requirements whose properties have been established as good. However, it is difficult to define and analyze requirements. Moreover, derivation of...
William N. Robinson
SIGSOFT
2010
ACM
13 years 6 months ago
The missing links: bugs and bug-fix commits
Empirical studies of software defects rely on links between bug databases and program code repositories. This linkage is typically based on bug-fixes identified in developer-enter...
Adrian Bachmann, Christian Bird, Foyzur Rahman, Pr...
ICSEA
2006
IEEE
14 years 2 months ago
Modeling and Evaluation of Software Systems with Object Stochastic Activity Networks
—Stochastic activity networks (SANs) are a stochastic generalization of Petri nets. SAN models have been used to evaluate a wide range of systems and are supported by several mod...
Mohammad Abdollahi Azgomi, Ali Movaghar
OOPSLA
2009
Springer
14 years 2 months ago
Supporting model evolution through demonstration-based model transformation
Model evolution is often supported by writing model transformation rules in specialized languages. This presents challenges to those who are unfamiliar with model transformation l...
Yu Sun