Sciweavers

KBSE
2009
IEEE
14 years 6 months ago
Understanding the Value of Software Engineering Technologies
SEESAW combines AI search tools, a Monte Carlo simulator, and some software process models. We show here that, when selecting technologies for a software project, SEESAW out-perfo...
Phillip Green II, Tim Menzies, Steve Williams, Ous...
KBSE
2009
IEEE
14 years 6 months ago
Design Rule Hierarchies and Parallelism in Software Development Tasks
—As software projects continue to grow in scale, being able to maximize the work that developers can carry out in parallel as a set of concurrent development tasks, without incur...
Sunny Wong, Yuanfang Cai, Giuseppe Valetto, Georgi...
KBSE
2009
IEEE
14 years 6 months ago
Static Validation of C Preprocessor Macros
—The widely used C preprocessor (CPP) is generally considered a source of difficulty for understanding and maintaining C/C++ programs. The main reason for this difficulty is CP...
Andreas Saebjoernsen, Lingxiao Jiang, Daniel J. Qu...
KBSE
2009
IEEE
14 years 6 months ago
Alattin: Mining Alternative Patterns for Detecting Neglected Conditions
—To improve software quality, static or dynamic verification tools accept programming rules as input and detect their violations in software as defects. As these programming rul...
Suresh Thummalapenta, Tao Xie
KBSE
2009
IEEE
14 years 6 months ago
ReAssert: Suggesting Repairs for Broken Unit Tests
—Developers often change software in ways that cause tests to fail. When this occurs, developers must determine whether failures are caused by errors in the code under test or in...
Brett Daniel, Vilas Jagannath, Danny Dig, Darko Ma...
KBSE
2009
IEEE
14 years 6 months ago
Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses
Given a program and an attack pattern (specified as a regular expression), we automatically generate string-based vulnerability signatures, i.e., a characterization that includes...
Fang Yu, Muath Alkhalaf, Tevfik Bultan
KBSE
2009
IEEE
14 years 6 months ago
Improving API Usage through Automatic Detection of Redundant Code
—Software projects often rely on third-party libraries made accessible through Application Programming Interfaces (APIs). We have observed many cases where APIs are used in ways ...
David Kawrykow, Martin P. Robillard
KBSE
2009
IEEE
14 years 6 months ago
A Petri Net Based Debugging Environment for QVT Relations
—In the Model-Driven Architecture (MDA) paradigm the Query/View/Transformation (QVT) standard plays a vital role for model transformations. Especially the high-level declarative ...
Manuel Wimmer, Gerti Kappel, Johannes Schönb&...
KBSE
2009
IEEE
14 years 6 months ago
Clone-Aware Configuration Management
Tung Thanh Nguyen, Hoan Anh Nguyen, Nam H. Pham, J...