Sciweavers

1051 search results - page 170 / 211
» Protocols in the use of empirical software engineering artif...
Sort
View
ICSE
2007
IEEE-ACM
14 years 9 months ago
Testing and Analysis of Access Control Policies
Policy testing and analysis are important techniques for high assurance of correct specification of access control policies. We propose a set of testing and analysis techniques fo...
Evan Martin
ICSE
2009
IEEE-ACM
14 years 3 months ago
Mining exception-handling rules as sequence association rules
Programming languages such as Java and C++ provide exception-handling constructs to handle exception conditions. Applications are expected to handle these exception conditions and...
Suresh Thummalapenta, Tao Xie
ICSM
2009
IEEE
14 years 3 months ago
On predicting the time taken to correct bug reports in open source projects
Existing studies on the maintenance of open source projects focus primarily on the analyses of the overall maintenance of the projects and less on specific categories like the co...
Prasanth Anbalagan, Mladen A. Vouk
ARCS
2009
Springer
14 years 3 months ago
Evaluating Sampling Based Hotspot Detection
In sampling based hotspot detection, performance engineers sample the running program periodically and record the Instruction Pointer (IP) addresses at the sampling. Empirically, f...
Qiang Wu, Oskar Mencer
ICST
2010
IEEE
13 years 7 months ago
Automated Bug Neighborhood Analysis for Identifying Incomplete Bug Fixes
—Although many static-analysis techniques have been developed for automatically detecting bugs, such as null dereferences, fewer automated approaches have been presented for anal...
Mijung Kim, Saurabh Sinha, Carsten Görg, Hina...