Sciweavers

787 search results - page 62 / 158
» Source code analysis and manipulation
Sort
View
MSR
2006
ACM
14 years 5 months ago
Micro pattern evolution
When analyzing the evolution history of a software project, we wish to develop results that generalize across projects. One approach is to analyze design patterns, permitting char...
Sunghun Kim, Kai Pan, E. James Whitehead Jr.
SIGSOFT
2003
ACM
14 years 12 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler
WSE
2002
IEEE
14 years 4 months ago
Dynamic Model Extraction and Statistical Analysis of Web Applications
The World Wide Web, initially intended as a way to publish static hypertexts on the Internet, is moving toward complex applications. Static Web sites are being gradually replaced ...
Paolo Tonella, Filippo Ricca
ACMSE
2006
ACM
14 years 5 months ago
Static analysis of anomalies and security vulnerabilities in executable files
Software researchers have already developed static code security checkers to parse through and scan source code files, looking for security vulnerabilities [8, 9]. What about exec...
Jay-Evan J. Tevis, John A. Hamilton Jr.
APLAS
2004
ACM
14 years 4 months ago
Detecting Software Defects in Telecom Applications Through Lightweight Static Analysis: A War Story
In safety-critical and high-reliability systems, software development and maintenance are costly endeavors. The cost can be reduced if software errors can be identified through au...
Tobias Lindahl, Konstantinos F. Sagonas