Sciweavers

SCAM
2008
IEEE
14 years 6 months ago
Using Program Transformations to Add Structure to a Legacy Data Model
An appropriate translation of the data model is central to any language migration effort. Finding a mapping between original and target data models may be challenging for legacy l...
Mariano Ceccato, Thomas Roy Dean, Paolo Tonella
SCAM
2008
IEEE
14 years 6 months ago
CoordInspector: A Tool for Extracting Coordination Data from Legacy Code
—More and more current software systems rely on non trivial coordination logic for combining autonomous services typically running on different platforms and often owned by diffe...
Nuno F. Rodrigues, Luís Soares Barbosa
SCAM
2008
IEEE
14 years 6 months ago
Automatic Determination of May/Must Set Usage in Data-Flow Analysis
Data-flow analysis is a common technique to gather program information for use in transformations such as register allocation, dead-code elimination, common subexpression elimina...
Andrew Stone, Michelle Strout, Shweta Behere
SCAM
2008
IEEE
14 years 6 months ago
DTS - A Software Defects Testing System
Zhao Hong Yang, Yun Zhan Gong, Xiao Qing, Wang Ya ...
SCAM
2008
IEEE
14 years 6 months ago
Is Cloned Code More Stable than Non-cloned Code?
This paper presents a study on the stability of cloned code. The results from an analysis of 200 weeks of evolution of five software system show that the stability as measured by...
Jens Krinke
SCAM
2008
IEEE
14 years 6 months ago
Analysis and Transformations for Efficient Query-Based Debugging
Michael Gorbovitski, K. Tuncay Tekle, Tom Rothamel...
SCAM
2008
IEEE
14 years 6 months ago
Aspect-Aware Points-to Analysis
Points-to analysis is a fundamental analysis technique whose results are useful in compiler optimization and software engineering tools. Although many points-to analysis algorithm...
Qiang Sun, Jianjun Zhao
SCAM
2008
IEEE
14 years 6 months ago
User-Input Dependence Analysis via Graph Reachability
Bug-checking tools have been used with some success in recent years to find bugs in software. For finding bugs that can cause security vulnerabilities, bug checking tools requir...
Bernhard Scholz, Chenyi Zhang, Cristina Cifuentes
SCAM
2008
IEEE
14 years 6 months ago
Some Assembly Required - Program Analysis of Embedded System Code
Programming embedded system software typically involves more than one programming language. Normally, a high-level language such as C/C++ is used for application oriented tasks an...
Ansgar Fehnker, Ralf Huuck, Felix Rauch, Sean Seef...