Sciweavers

272 search results - page 40 / 55
» Program slicing
Sort
View
ACSAC
2006
IEEE
14 years 1 months ago
Data Sandboxing: A Technique for Enforcing Confidentiality Policies
When an application reads private / sensitive information and subsequently communicates on an output channel such as a public file or a network connection, how can we ensure that ...
Tejas Khatiwala, Raj Swaminathan, V. N. Venkatakri...
MICCAI
2004
Springer
14 years 10 months ago
A Semi-automatic Endocardial Border Detection Method for 4D Ultrasound Data
We propose a semi-automatic endocardial border detection method for 3D+T cardiac ultrasound data based on pattern matching and dynamic programming, operating on 2D slices of the 3D...
Boudewijn J. Krenning, Charles T. Lancée, G...
SIGSOFT
2009
ACM
14 years 10 months ago
SCA: a semantic conflict analyzer for parallel changes
Parallel changes are becoming increasingly prevalent in the development of large scale software system. To further study the relationship between parallel changes and faults, we h...
Danhua Shao, Sarfraz Khurshid, Dewayne E. Perry
ICSE
2008
IEEE-ACM
14 years 10 months ago
Debugging reinvented: asking and answering why and why not questions about program behavior
When software developers want to understand the reason for a program's behavior, they must translate their questions about the behavior into a series of questions about code,...
Andrew Jensen Ko, Brad A. Myers
CHI
2009
ACM
14 years 10 months ago
Finding causes of program output with the Java Whyline
Debugging and diagnostic tools are some of the most important software development tools, but most expect developers choose the right code to inspect. Unfortunately, this rarely o...
Andrew Jensen Ko, Brad A. Myers