Sciweavers

682 search results - page 82 / 137
» Java Implementation Verification Using Reverse Engineering
Sort
View
ECLIPSE
2006
ACM
14 years 1 months ago
Visualization of clone detection results
The goal of a clone detection tool is to identify sections of code that are duplicated in a program. The result of the detection is presented in some manner for the user to view, ...
Robert Tairas, Jeff Gray, Ira D. Baxter
ICSE
2009
IEEE-ACM
14 years 10 days ago
A compositional approach to bidirectional model transformation
Bidirectional model transformation plays an important role in maintaining consistency between two models, and has many potential applications in software development, including mo...
Soichiro Hidaka, Zhenjiang Hu, Hiroyuki Kato, Keis...
C3S2E
2008
ACM
13 years 9 months ago
Towards a mutation-based automatic framework for evaluating code clone detection tools
In the last decade, a great many code clone detection tools have been proposed. Such a large number of tools calls for a quantitative comparison, and there have been several attem...
Chanchal Kumar Roy, James R. Cordy
KBSE
2005
IEEE
14 years 1 months ago
Testing in resource constrained execution environments
Software for resource constrained embedded devices is often implemented in the Java programming language because the Java compiler and virtual machine provide enhanced safety, por...
Gregory M. Kapfhammer, Mary Lou Soffa, Daniel Moss...
ISTA
2003
13 years 9 months ago
Managing Business Logic with Symbolic Computation
: A new approach of building enterprise distributed applications for layer of business rules as standard part of architecture is proposed in this paper. The approach uses symbolic ...
Ruslan Shevchenko, Anatoly E. Doroshenko