Sciweavers

ICSE
2009
IEEE-ACM
14 years 6 months ago
Toward deeply adaptive societies of digital systems
Modern societies are pervaded by computerized, heterogeneous devices designed for specific purposes, but also more and more often capable of interacting with other devices for en...
Antonio Carzaniga, Giovanni Denaro, Mauro Pezz&egr...
ICSE
2009
IEEE-ACM
14 years 6 months ago
Guided path exploration for regression test generation
Regression test generation aims at generating a test suite that can detect behavioral differences between the original and the modified versions of a program. Regression test gen...
Kunal Taneja, Tao Xie, Nikolai Tillmann, Jonathan ...
ICSE
2009
IEEE-ACM
14 years 6 months ago
Lightweight fault-localization using multiple coverage types
Lightweight fault-localization techniques use program coverage to isolate the parts of the code that are most suspicious of being faulty. In this paper, we present the results of ...
Raúl A. Santelices, James A. Jones, Yanbing...
ICSE
2009
IEEE-ACM
14 years 6 months ago
How do system architectures affect software requirements?
James A. Miller, Remo Ferrari, Nazim H. Madhavji
ICSE
2009
IEEE-ACM
14 years 6 months ago
SemDiff: Analysis and recommendation support for API evolution
As a framework evolves, changes in its Application Programming Interface (API) can break client programs that extend the framework. Repairing a client program can be a challenging...
Barthélémy Dagenais, Martin P. Robil...
ICSE
2009
IEEE-ACM
14 years 6 months ago
Taming Dynamically Adaptive Systems using models and aspects
Since software systems need to be continuously available under varying conditions, their ability to evolve at runtime is increasingly seen as one key issue. Modern programming fra...
Brice Morin, Olivier Barais, Grégory Nain, ...
ICSE
2009
IEEE-ACM
14 years 6 months ago
Predicting defects in SAP Java code: An experience report
Which components of a large software system are the most defect-prone? In a study on a large SAP Java system, we evaluated and compared a number of defect predictors, based on cod...
Tilman Holschuh, Markus Pauser, Kim Herzig, Thomas...
ICSE
2009
IEEE-ACM
14 years 6 months ago
Using quantitative analysis to implement autonomic IT systems
The software underpinning today’s IT systems needs to adapt dynamically and predictably to rapid changes in system workload, environment and objectives. We describe a software f...
Radu Calinescu, Marta Z. Kwiatkowska
FASE
2009
Springer
14 years 6 months ago
A Formal Connection between Security Automata and JML Annotations
Security automata are a convenient way to describe security policies. Their typical use is to monitor the execution of an application, and to interrupt it as soon as the security p...
Marieke Huisman, Alejandro Tamalet
FASE
2009
Springer
14 years 6 months ago
Inquiry and Introspection for Non-deterministic Queries in Mobile Networks
Vasanth Rajamani, Christine Julien, Jamie Payton, ...