Sciweavers

1080 search results - page 129 / 216
» Improving Software Inspections by Using Reading Techniques
Sort
View
ICSE
2009
IEEE-ACM
14 years 10 months ago
Modular string-sensitive permission analysis with demand-driven precision
In modern software systems, programs are obtained by dynamically assembling components. This has made it necessary to subject component providers to access-control restrictions. W...
Emmanuel Geay, Marco Pistoia, Takaaki Tateishi, Ba...
CLUSTER
2007
IEEE
14 years 1 months ago
Identifying energy-efficient concurrency levels using machine learning
Abstract-- Multicore microprocessors have been largely motivated by the diminishing returns in performance and the increased power consumption of single-threaded ILP microprocessor...
Matthew Curtis-Maury, Karan Singh, Sally A. McKee,...
SIGSOFT
2005
ACM
14 years 10 months ago
Context- and path-sensitive memory leak detection
We present a context- and path-sensitive algorithm for detecting memory leaks in programs with explicit memory management. Our leak detection algorithm is based on an underlying e...
Yichen Xie, Alexander Aiken
ICSE
2007
IEEE-ACM
14 years 3 months ago
Architecture Knowledge Management: Challenges, Approaches, and Tools
Capturing the technical knowledge, contextual information, and rationale surrounding the design decisions underpinning system architectures can greatly improve the software develo...
Muhammad Ali Babar, Ian Gorton
ECOOPWEXCEPTION
2006
Springer
14 years 25 days ago
Exception Handling in the Choices Operating System
Exception handling is a powerful abstraction that can be used to help manage errors and support the construction of reliable operating systems. Using exceptions to notify system co...
Francis M. David, Jeffrey C. Carlyle, Ellick Chan,...