Sciweavers

IWPC
2009
IEEE
14 years 6 months ago
A bug you like: A framework for automated assignment of bugs
Assigning bug reports to individual developers is typically a manual, time-consuming, and tedious task. In this paper, we present a framework for automated assignment of bug-fixi...
Olga Baysal, Michael W. Godfrey, Robin Cohen
IWPC
2009
IEEE
14 years 6 months ago
An exploratory study on assessing feature location techniques
This paper presents an exploratory study of ten feature location techniques that use various combinations of textual, dynamic, and static analyses. Unlike previous studies, the ap...
Meghan Revelle, Denys Poshyvanyk
IWPC
2009
IEEE
14 years 6 months ago
An empirical study on the comprehension of stereotyped UML class diagram layouts
An empirical study is presented that investigates how stereotype based layouts impact the comprehension of UML class diagrams. This work continues a previous study using eye-track...
Bonita Sharif, Jonathan I. Maletic
IWPC
2009
IEEE
14 years 6 months ago
Dn-based architecture assessment of Java Open Source software systems
Alexander Serebrenik, Serguei A. Roubtsov, Mark va...
IWPC
2009
IEEE
14 years 6 months ago
The loss of architectural knowledge during system evolution: An industrial case study
Architecture defines the components of a system and their dependencies. The knowledge about how the architecture is intended to be implemented is essential to keep the system str...
Martin Feilkas, Daniel Ratiu, Elmar Jürgens
IWPC
2009
IEEE
14 years 6 months ago
The effectiveness of source code obfuscation: An experimental assessment
Source code obfuscation is a protection mechanism widely used to limit the possibility of malicious reverse engineering or attack activities on a software system. Although several...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...
IWPC
2009
IEEE
14 years 6 months ago
Impact analysis and visualization toolkit for static crosscutting in AspectJ
Understanding aspect-oriented systems, without appropriate tool support, is a difficult and a recognized problem in the research community. Surprisingly, little has been done to ...
Dehua Zhang, Ekwa Duala-Ekoko, Laurie J. Hendren
IWPC
2009
IEEE
14 years 6 months ago
Vector space analysis of software clones
In this paper, we introduce a technique for applying Independent Component Analysis to vector space representations of software code fragments such as methods or blocks. The dista...
Scott Grant, James R. Cordy
IWPC
2009
IEEE
14 years 6 months ago
A plethora of paths
A common static software bug detection technique is to use path simulation. Each execution path is simulated using symbolic variables to determine if any software errors could occ...
Eric Larson
IWPC
2009
IEEE
14 years 6 months ago
Practical static analysis for inference of security-related program properties
We present a static analysis framework for inference of security-related program properties. Within this framework we design and implement ownership, immutability and information ...
Yin Liu, Ana Milanova