Code churn, the amount of code change taking place within a software unit over time, has been correlated with fault-proneness in software systems. We investigate the use of code c...
Lucas Layman, Gunnar Kudrjavets, Nachiappan Nagapp...
Abstract. Trigger-based code (malicious in many cases, but not necessarily) only executes when specific inputs are received. Symbolic execution has been one of the most powerful t...
Today’s integrated development environments (IDEs) are hampered by their dependence on files and file-based editing. A novel user interface that is based on collections of light...
In this paper asymptotic methods are used to form lower bounds on the free distance to constraint length ratio of several ensembles of regular, asymptotically good, protographbased...
David G. M. Mitchell, Ali Emre Pusane, Norbert Goe...
This paper presents a method to determine if a usable wheelchair accessible route in a facility exists using motion-planning techniques. We use a `performance-based' approach...
Charles S. Han, Kincho H. Law, Jean-Claude Latombe...