Sciweavers

1782 search results - page 277 / 357
» Tool Support for Proof Engineering
Sort
View
ISSRE
2008
IEEE
14 years 3 months ago
Detection and Prediction of Resource-Exhaustion Vulnerabilities
Systems connected to the Internet are highly susceptible to denial-of-service attacks that can compromise service availability, causing damage to customers and providers. Due to e...
João Antunes, Nuno Ferreira Neves, Paulo Ve...
IWPC
2008
IEEE
14 years 3 months ago
Reusing Program Investigation Knowledge for Code Understanding
Software maintenance tasks typically involve an important amount of program investigation effort on the part of software developers. To what extent can we benefit from prior prog...
Martin P. Robillard, Putra Manggala
SCAM
2008
IEEE
14 years 3 months ago
From Indentation Shapes to Code Structures
In a previous study, we showed that indentation was regular across multiple languages and the variance in the level of indentation of a block of revised code is correlated with me...
Abram Hindle, Michael W. Godfrey, Richard C. Holt
ICSM
2007
IEEE
14 years 3 months ago
Design recovery and maintenance of build systems
The build system forms an indispensable part of any software project. It needs to evolve in parallel with the source code in order to build, test and install the software. Unfortu...
Bram Adams, Herman Tromp, Kris De Schutter, Wolfga...
ICSM
2007
IEEE
14 years 3 months ago
Mining the Lexicon Used by Programmers during Sofware Evolution
Identifiers represent an important source of information for programmers understanding and maintaining a system. Self-documenting identifiers reduce the time and effort necessa...
Giuliano Antoniol, Yann-Gaël Guéh&eacu...