Sciweavers

151 search results - page 15 / 31
» Using Informal and Formal Techniques for the Reverse Enginee...
Sort
View
SAS
2007
Springer
111views Formal Methods» more  SAS 2007»
14 years 1 months ago
Exploiting Pointer and Location Equivalence to Optimize Pointer Analysis
Abstract. Pointer information is a prerequisite for most program analyses, and inclusion-based, i.e. Andersen-style, pointer analysis is widely used to compute such information. Ho...
Ben Hardekopf, Calvin Lin
SIGSOFT
2007
ACM
14 years 8 months ago
Efficient token based clone detection with flexible tokenization
Code clones are similar code fragments that occur at multiple locations in a software system. Detection of code clones provides useful information for maintenance, reengineering, ...
Hamid Abdul Basit, Stan Jarzabek
CLEIEJ
2010
13 years 4 months ago
Professional Training Program Management through Holonic Networks
Holonic networks constitute a type of organizational structures widely used at manufacturing enterprises. In an educational context, however, this type of structures remains practi...
Jonas Montilva C., Milagro Rivero, Judith Barrios ...
IUI
2003
ACM
14 years 23 days ago
Dynamic web page authoring by example using ontology-based domain knowledge
Authoring dynamic web pages is an inherently difficult task. We present DESK, an interactive authoring tool that allows the customization of dynamic page generation procedures wit...
José Antonio Macías Iglesias, Pablo ...
PLDI
2004
ACM
14 years 28 days ago
KISS: keep it simple and sequential
The design of concurrent programs is error-prone due to the interaction between concurrently executing threads. Traditional automated techniques for finding errors in concurrent ...
Shaz Qadeer, Dinghao Wu