Sciweavers

6171 search results - page 56 / 1235
» The FrameNet Data and Software
Sort
View
ICSM
2009
IEEE
13 years 5 months ago
An empirical study on the risks of using off-the-shelf techniques for processing mailing list data
Mailing list repositories contain valuable information about the history of a project. Research is starting to mine this information to support developers and maintainers of longl...
Nicolas Bettenburg, Emad Shihab, Ahmed E. Hassan
CC
2005
Springer
14 years 1 months ago
A Compiler-Based Approach to Data Security
Feihui Li, Guilin Chen, Mahmut T. Kandemir, Richar...
TACAS
2007
Springer
103views Algorithms» more  TACAS 2007»
14 years 2 months ago
A Reachability Predicate for Analyzing Low-Level Software
Reasoning about heap-allocated data structures such as linked lists and arrays is challenging. The reachability predicate has proved to be useful for reasoning about the heap in ty...
Shaunak Chatterjee, Shuvendu K. Lahiri, Shaz Qadee...
PKDD
2010
Springer
127views Data Mining» more  PKDD 2010»
13 years 5 months ago
Software-Defect Localisation by Mining Dataflow-Enabled Call Graphs
Defect localisation is essential in software engineering and is an important task in domain-specific data mining. Existing techniques building on call-graph mining can localise dif...
Frank Eichinger, Klaus Krogmann, Roland Klug, Klem...
ISSTA
2004
ACM
14 years 1 months ago
Model checking XML manipulating software
The use of XML as the de facto data exchange standard has allowed integration of heterogeneous web based software systems regardless of implementation platforms and programming la...
Xiang Fu, Tevfik Bultan, Jianwen Su