Sciweavers

698 search results - page 13 / 140
» Evaluating Key Statements Analysis
Sort
View
ICSE
2008
IEEE-ACM
14 years 10 months ago
Scalable detection of semantic clones
Several techniques have been developed for identifying similar code fragments in programs. These similar fragments, referred to as code clones, can be used to identify redundant c...
Mark Gabel, Lingxiao Jiang, Zhendong Su
APSEC
2001
IEEE
14 years 1 months ago
A Slicing Method for Object-Oriented Programs Using Lightweight Dynamic Information
Program slicing has been used for efficient program debugging activities. Program slice is computed by analyzing dependence relations between program statements. We can divide dep...
Fumiaki Ohata, Kouya Hirose, Masato Fujii, Katsuro...
FM
2003
Springer
104views Formal Methods» more  FM 2003»
14 years 3 months ago
Proving the Shalls
Incomplete, inaccurate, ambiguous, and volatile requirements have plagued the software industry since its inception. The convergence of model-based development and formal methods o...
Steven P. Miller, Alan C. Tribble, Mats Per Erik H...
INFOCOM
2006
IEEE
14 years 3 months ago
Reverse Hashing for High-Speed Network Monitoring: Algorithms, Evaluation, and Applications
— A key function for network traffic monitoring and analysis is the ability to perform aggregate queries over multiple data streams. Change detection is an important primitive w...
Robert T. Schweller, Zhichun Li, Yan Chen, Yan Gao...
TMC
2008
109views more  TMC 2008»
13 years 9 months ago
SBK: A Self-Configuring Framework for Bootstrapping Keys in Sensor Networks
Key predistribution has been claimed to be the only viable approach for establishing shared keys between neighboring sensors after deployment for a typical sensor network. However,...
Fang Liu, Xiuzhen Cheng, Liran Ma, Kai Xing