Sciweavers

56 search results - page 9 / 12
» Character String Predicate Based Automatic Software Test Dat...
Sort
View
CCS
2005
ACM
14 years 18 days ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
IDEAS
2005
IEEE
142views Database» more  IDEAS 2005»
14 years 20 days ago
Automatically Maintaining Wrappers for Web Sources
A substantial subset of the web data follows some kind of underlying structure. Nevertheless, HTML does not contain any schema or semantic information about the data it represents...
Juan Raposo, Alberto Pan, Manuel Álvarez, J...
ICSE
2008
IEEE-ACM
14 years 7 months ago
Continuous software quality supervision using SourceInventory and Columbus
Several tools and methods for source code quality assurance based on static analysis finally reached a state when they are applicable in practice and recognized by the industry. H...
Árpád Beszédes, Rudolf Ferenc...
IADIS
2008
13 years 8 months ago
Data Mining Applications in Intelligent Integrated Development Environments
Programming and developing of small scale software applications can be accomplished with simple command-line compilers that can be used to compile, test, and execute code generati...
Ali Farahmand Nejad, Shahabedin Bayati, Sadegh Kha...
SIGSOFT
2005
ACM
14 years 7 months ago
Applying classification techniques to remotely-collected program execution data
There is an increasing interest in techniques that support measurement and analysis of fielded software systems. One of the main goals of these techniques is to better understand ...
Murali Haran, Alan F. Karr, Alessandro Orso, Adam ...