GEGICK, MICHAEL CHARLES. Predicting Attack-prone Components with Source Code Static Analyzers. (Under the direction of Laurie Williams). No single vulnerability detection techniqu...
Many impact studies require climate change information at a finer resolution than that provided by Global Climate Models (GCMs). In the last 10 years, downscaling techniques, both...
Masoud Hessami, Philippe Gachon, Taha B. M. J. Oua...
Abstract— Adapting software components usable by a particular application is a crucial issue in software component based technology. In fact, software components can be used in c...
We propose a novel, practical coverage metric called “location pairs” (LP) for concurrently-accessed software components. The LP metric captures well common concurrency errors ...
Serdar Tasiran, Tayfun Elmas, Guven Bolukbasi, M. ...
In this paper, the specification of Verity, a webbased instructional tool, is presented. Verity is intended to be used as a learning assistant and self-assessment tool, more than ...
Sergiu Dascalu, Daniela Saru, Ryan Simpson, Justin...