Sciweavers

ICSE
2007
IEEE-ACM
14 years 11 months ago
Automated Inference of Pointcuts in Aspect-Oriented Refactoring
Software refactoring is the process of reorganizing the internal structure of code while preserving the external behavior. Aspect-Oriented Programming (AOP) provides new modulariz...
Prasanth Anbalagan, Tao Xie
ICSE
2007
IEEE-ACM
14 years 11 months ago
SoftGUESS: Visualization and Exploration of Code Clones in Context
We introduce SoftGUESS, a code clone exploration system. SoftGUESS is built on the more general GUESS system which provides users with a mechanism to interactively explore graph s...
Eytan Adar, Miryung Kim
ICSE
2007
IEEE-ACM
14 years 11 months ago
GoalDebug: A Spreadsheet Debugger for End Users
We present a spreadsheet debugger targeted at end users. Whenever the computed output of a cell is incorrect, the user can supply an expected value for a cell, which is employed b...
Robin Abraham, Martin Erwig
ICSE
2007
IEEE-ACM
14 years 11 months ago
Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis
This paper presents an approach to statically retrofit legacy servers with mechanisms for authorization policy enforcement. The approach is based upon the observation that securit...
Vinod Ganapathy, Dave King 0002, Trent Jaeger, Som...
ICSE
2007
IEEE-ACM
14 years 11 months ago
UML/Analyzer: A Tool for the Instant Consistency Checking of UML Models
Large design models contain tens of thousands of model elements. Designers easily get overwhelmed maintaining the consistency of such design models over time. Not only is it hard ...
Alexander Egyed
ICSE
2007
IEEE-ACM
14 years 11 months ago
Predicting Faults from Cached History
We analyze the version history of 7 software systems to predict the most fault prone entities and files. The basic assumption is that faults do not occur in isolation, but rather ...
Sunghun Kim, Thomas Zimmermann, E. James Whitehead...
ICSE
2007
IEEE-ACM
14 years 11 months ago
Path-Sensitive Inference of Function Precedence Protocols
Function precedence protocols define ordering relations among function calls in a program. In some instances, precedence protocols are well-understood (e.g., a call to pthread mut...
Murali Krishna Ramanathan, Ananth Grama, Suresh Ja...
ICSE
2007
IEEE-ACM
14 years 11 months ago
Presentations by Programmers for Programmers
A common form of live technical presentation is that given by programmers for a programming audience during conferences, demonstrations, code reviews, and tutorials. Such presenta...
Li-Te Cheng, Michael Desmond, Margaret-Anne D. Sto...
ICSE
2007
IEEE-ACM
14 years 11 months ago
Feedback-Directed Random Test Generation
We present a technique that improves random test generation by incorporating feedback obtained from executing test inputs as they are created. Our technique builds inputs incremen...
Carlos Pacheco, Shuvendu K. Lahiri, Michael D. Ern...
ICSE
2007
IEEE-ACM
14 years 11 months ago
Adaptive Online Program Analysis
Analyzing a program run can provide important insights about its correctness. Dynamic analysis of complex correctness properties, however, usually results in significant run-time ...
Matthew B. Dwyer, Alex Kinneer, Sebastian G. Elbau...