Sciweavers

298 search results - page 11 / 60
» Towards experimental evaluation of code obfuscation techniqu...
Sort
View
ISSRE
2007
IEEE
13 years 10 months ago
Data Mining Techniques for Building Fault-proneness Models in Telecom Java Software
This paper describes a study performed in an industrial setting that attempts to build predictive models to identify parts of a Java system with a high probability of fault. The s...
Erik Arisholm, Lionel C. Briand, Magnus Fuglerud
WWW
2007
ACM
14 years 9 months ago
Towards automating regression test selection for web services
This paper reports a safe regression test selection (RTS) approach that is designed for verifying Web services in an end-to-end manner. The Safe RTS technique has been integrated ...
Michael Ruth, Shengru Tu
CORR
2006
Springer
138views Education» more  CORR 2006»
13 years 8 months ago
Applying and Combining Three Different Aspect Mining Techniques
Abstract. Understanding a software system at source-code level requires understanding the different concerns that it addresses, which in turn requires a way to identify these conce...
Mariano Ceccato, Marius Marin, Kim Mens, Leon Moon...
ICSE
2004
IEEE-ACM
14 years 8 months ago
SNIAFL: Towards a Static Non-Interactive Approach to Feature Location
To facilitate software maintenance and evolution, a helpful step is to locate features concerned in a particular maintenance task. In the literature, both dynamic and interactive ...
Wei Zhao, Lu Zhang, Yin Liu, Jiasu Sun, Fuqing Yan...
EVOW
2010
Springer
14 years 3 months ago
A Directed Mutation Operator for Real Coded Genetic Algorithms
Abstract. Developing directed mutation methods has been an interesting research topic to improve the performance of genetic algorithms (GAs) for function optimization. This paper i...
Imtiaz Korejo, Shengxiang Yang, Changhe Li