Sciweavers

787 search results - page 152 / 158
» Source code analysis and manipulation
Sort
View
ICST
2011
IEEE
13 years 1 months ago
An Empirical Study on the Relation between Dependency Neighborhoods and Failures
—Changing source code in large software systems is complex and requires a good understanding of dependencies between software components. Modification to components with little ...
Thomas Zimmermann, Nachiappan Nagappan, Kim Herzig...
ICSE
2008
IEEE-ACM
14 years 10 months ago
Static detection of cross-site scripting vulnerabilities
Web applications support many of our daily activities, but they often have security problems, and their accessibility makes them easy to exploit. In cross-site scripting (XSS), an...
Gary Wassermann, Zhendong Su
ISBRA
2009
Springer
14 years 4 months ago
Imputation-Based Local Ancestry Inference in Admixed Populations
Abstract. Accurate inference of local ancestry from whole-genome genetic variation data is critical for understanding the history of admixed human populations and detecting SNPs as...
Bogdan Pasaniuc, Justin Kennedy, Ion I. Mandoiu
MSR
2006
ACM
14 years 3 months ago
Using software birthmarks to identify similar classes and major functionalities
Software birthmarks are unique and native characteristics of every software component. Two components having similar birthmarks indicate that they are similar in functionality, st...
Takeshi Kakimoto, Akito Monden, Yasutaka Kamei, Ha...
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
14 years 2 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw