Sciweavers

90 search results - page 14 / 18
» Text mining and software engineering: an integrated source c...
Sort
View
132
Voted
MSR
2005
ACM
15 years 9 months ago
Mining evolution data of a product family
Diversification of software assets through changing requirements impose a constant challenge on the developers and maintainers of large software systems. Recent research has addr...
Michael Fischer, Johann Oberleitner, Jacek Ratzing...
ICSM
2007
IEEE
15 years 10 months ago
Applying Interface-Contract Mutation in Regression Testing of Component-Based Software
Regression testing, which plays an important role in software maintenance, usually relies on test adequacy criteria to select and prioritize test cases. However, with the wide use...
Shan-Shan Hou, Lu Zhang, Tao Xie, Hong Mei, Jiasu ...
KBSE
2009
IEEE
15 years 10 months ago
Code Completion from Abbreviated Input
—Abbreviation Completion is a novel technique to improve the efficiency of code-writing by supporting code completion of multiple keywords based on non-predefined abbreviated inp...
Sangmok Han, David R. Wallace, Robert C. Miller
157
Voted
WCRE
1995
IEEE
15 years 7 months ago
Pattern Matching for Design Concept Localization
A legacy system is an operational, large-scale software system that is maintained beyond its first generation of programmers. It typically represents a massive economic investmen...
Kostas Kontogiannis, Renato de Mori, Morris Bernst...
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 8 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw