Sciweavers

SCAM
2007
IEEE
14 years 6 months ago
Fast Approximate Matching of Programs for Protecting Libre/Open Source Software by Using Spatial Indexes
To encourage open source/libre software development, it is desirable to have tools that can help to identify open source license violations. This paper describes the implementatio...
Arnoldo José Müller Molina, Takeshi Sh...
SCAM
2007
IEEE
14 years 6 months ago
On Temporal Path Conditions in Dependence Graphs
Program dependence graphs are a well-established device to represent possible information flow in a program. Path conditions in dependence graphs have been proposed to express mo...
Andreas Lochbihler, Gregor Snelting
SCAM
2007
IEEE
14 years 6 months ago
A Framework for Studying Clones In Large Software Systems
Clones are code segments that have been created by copying-and-pasting from other code segments. Clones occur often in large software systems. It is reported that 5 to 50% of the ...
Zhen Ming Jiang, Ahmed E. Hassan
SCAM
2007
IEEE
14 years 6 months ago
Statement-Level Cohesion Metrics and their Visualization
Slice-based metrics for cohesion have been defined and examined for years. However, if a module with low cohesion has been identified, the metrics cannot help the maintainer to ...
Jens Krinke
SCAM
2007
IEEE
14 years 6 months ago
SUDS: An Infrastructure for Creating Bug Detection Tools
SUDS is a powerful infrastructure for creating dynamic bug detection tools. It contains phases for both static analysis and dynamic instrumentation allowing users to create tools ...
Eric Larson
QUATIC
2007
IEEE
14 years 6 months ago
Modeling the Experimental Software Engineering Process
– Systematic reviews on software engineering literature have shown an insufficient experimental validation of claims, when compared to the standard practice in other wellestablis...
Miguel Goulão, Fernando Brito e Abreu
QSIC
2007
IEEE
14 years 6 months ago
A Pattern-Based Constraint Description Approach for Web Services
Current WSDL-based description specifies only the operation signatures and locations of Web services. It is widely recognized that a richer description is needed. WS-Security, WS-...
Qianxiang Wang, Min Li, Na Meng, Yonggang Liu, Hon...
QSIC
2007
IEEE
14 years 6 months ago
Synthesizing Component-Based WSN Applications via Automatic Combination of Code Optimization Techniques
Wireless sensor network (WSN) applications sense events in-situ and compute results in-network. Their software components should run on platforms with stringent constraints on nod...
Zhenyu Zhang, W. K. Chan, T. H. Tse
QSIC
2007
IEEE
14 years 6 months ago
Model Checking Security Pattern Compositions
Security patterns capture best practice on secure software design and development. They document typical solutions to security problems. To ensure security, large software system ...
Jing Dong, Tu Peng, Yajing Zhao