Sciweavers

1412 search results - page 127 / 283
» The Value of Outsourced Software
Sort
View
ICSE
1997
IEEE-ACM
14 years 2 months ago
Lackwit: A Program Understanding Tool Based on Type Inference
By determining, statically, where the structure of a program requires sets of variables to share a common tation, we can identify abstract data types, detect ion violations, find ...
Robert O'Callahan, Daniel Jackson
AADEBUG
1993
Springer
14 years 2 months ago
Slicing Programs with Arbitrary Control-flow
Program slicing is a program transformation that is useful in program debugging, program maintenance, and other applications that involve understanding program behavior. Given a p...
Thomas Ball, Susan Horwitz
COMPSAC
2009
IEEE
14 years 2 months ago
GUI-Based Testing of Boundary Overflow Vulnerability
Boundary overflows are caused by violation of constraints, mostly limiting the range of internal values of a program, and can be provoked by an intruder to gain control of or acce...
Tugkan Tuglular, Can A. Muftuoglu, Özgür...
ESEM
2007
ACM
14 years 2 months ago
Comparison of Outlier Detection Methods in Fault-proneness Models
In this paper, we experimentally evaluated the effect of outlier detection methods to improve the prediction performance of fault-proneness models. Detected outliers were removed ...
Shinsuke Matsumoto, Yasutaka Kamei, Akito Monden, ...
AUIC
2004
IEEE
14 years 1 months ago
A Knowledge Management Approach to User Support
This paper considers the problem of computer user support and workplace learning in general. Theoretically our work is influenced by ideas on knowledge management, expertise netwo...
R. T. Jim Eales