Sciweavers

ICSE
2009
IEEE-ACM
14 years 6 months ago
Towards safety guarantees for service-oriented systems
In this paper I will address the problem of verifying that a service-oriented embedded system fulÀlls required safety guarantees. Services will be represented by collaborations a...
Basil Becker
ICSE
2009
IEEE-ACM
14 years 6 months ago
Verifying networked programs using a model checker extension
Model checking finds failures in software by exploring every possible execution schedule. Until recently it has been mainly applied to stand-alone applications. This paper presen...
Watcharin Leungwattanakit, Cyrille Artho, Masami H...
ICSE
2009
IEEE-ACM
14 years 6 months ago
Mining recurrent activities: Fourier analysis of change events
Within the field of software repository mining, it is common practice to extract change-events from source control systems and then abstract these events to allow for different a...
Abram Hindle, Michael W. Godfrey, Richard C. Holt
ICSE
2009
IEEE-ACM
14 years 6 months ago
Complete and accurate clone detection in graph-based models
Model-Driven Engineering (MDE) has become an important development framework for many large-scale software. Previous research has reported that as in traditional code-based develo...
Nam H. Pham, Hoan Anh Nguyen, Tung Thanh Nguyen, J...
ICSE
2009
IEEE-ACM
14 years 6 months ago
Semantics-based code search
Our goal is to use the vast repositories of available open source code to generate specific functions or classes that meet a user’s specifications. The key words here are spec...
Steven P. Reiss
ICSE
2009
IEEE-ACM
14 years 6 months ago
Save-IDE - A tool for design, analysis and implementation of component-based embedded systems
The paper presents Save-IDE, an Integrated Development Environment for the development of component-based embedded systems. Save-IDE supports efficient development of dependable ...
Séverine Sentilles, Anders Pettersson, Dag ...
ICSE
2009
IEEE-ACM
14 years 6 months ago
Automatically capturing source code context of NL-queries for software maintenance and reuse
As software systems continue to grow and evolve, locating code for maintenance and reuse tasks becomes increasingly difficult. Existing static code search techniques using natura...
Emily Hill, Lori L. Pollock, K. Vijay-Shanker
ICSE
2009
IEEE-ACM
14 years 6 months ago
Automatic creation of SQL Injection and cross-site scripting attacks
We present a technique for finding security vulnerabilities in Web applications. SQL Injection (SQLI) and crosssite scripting (XSS) attacks are widespread forms of attack in whic...
Adam Kiezun, Philip J. Guo, Karthick Jayaraman, Mi...