Sciweavers

289 search results - page 25 / 58
» Using Slicing to Identify Duplication in Source Code
Sort
View
124
Voted
DAGSTUHL
2006
15 years 5 months ago
Detection of Plagiarism in University Projects Using Metrics-based Spectral Similarity
Abstract. An original method of spectral similarity analysis for plagiarism detection in university project is presented. The approach is based on a clone detection tool called CLA...
Ettore Merlo
153
Voted
COMPSAC
2001
IEEE
15 years 7 months ago
Scenario-Based Functional Regression Testing
Regression testing has been a popular quality assurance technique. Most regression testing techniques are based on code or software design. This paper proposes a scenario-based fu...
Raymond A. Paul, Lian Yu, Wei-Tek Tsai, Xiaoying B...
132
Voted
ICST
2009
IEEE
15 years 10 months ago
Predicting Attack-prone Components
GEGICK, MICHAEL CHARLES. Predicting Attack-prone Components with Source Code Static Analyzers. (Under the direction of Laurie Williams). No single vulnerability detection techniqu...
Michael Gegick, Pete Rotella, Laurie A. Williams
158
Voted
IWPC
2006
IEEE
15 years 9 months ago
Dynamic Analysis of Software Systems using Execution Pattern Mining
Software system analysis for extracting system functionality remains as a major problem in the reverse engineering literature and the early approaches mainly rely on static proper...
Hossein Safyallah, Kamran Sartipi
125
Voted
ADBIS
2005
Springer
147views Database» more  ADBIS 2005»
15 years 9 months ago
Declarative Data Fusion - Syntax, Semantics, and Implementation
In today’s integrating information systems data fusion, i.e., the merging of multiple tuples about the same real-world object into a single tuple, is left to ETL tools and other ...
Jens Bleiholder, Felix Naumann