Sciweavers

SCAM
2007
IEEE
14 years 5 months ago
Toward an Implementation of the "Form Template Method" Refactoring
This paper presents an implementation of the “form template method” refactoring. This transformation has not been automated yet, but has many similarities with other transform...
Nicolas Juillerat, Béat Hirsbrunner
SCAM
2007
IEEE
14 years 5 months ago
Extending Attribute Grammars with Collection Attributes--Evaluation and Applications
Collection attributes, as defined by Boyland, can be used as a mechanism for concisely specifying cross-referencelike properties such as callee sets, subclass sets, and sets of v...
Eva Magnusson, Torbjörn Ekman, Görel Hed...
SCAM
2007
IEEE
14 years 5 months ago
Finding Inputs that Reach a Target Expression
We present an automated program analysis, called Reach, to compute program inputs that cause evaluation of explicitly-marked target expressions. Reach has a range of applications ...
Matthew Naylor, Colin Runciman
SCAM
2007
IEEE
14 years 5 months ago
SQuAVisiT: A Software Quality Assessment and Visualisation Toolset
Software quality assessment of large COBOL industrial legacy systems, both for maintenance or migration purposes, mounts a serious challenge. We present the Software Quality Asses...
Serguei A. Roubtsov, Alexandru Telea, Danny Holten
SCAM
2007
IEEE
14 years 5 months ago
Improved Static Resolution of Dynamic Class Loading in Java
Modern applications are becoming increasingly more dynamic and flexible. In Java software, one important flexibility mechanism is dynamic class loading. Unfortunately, the vast ...
Jason Sawin, Atanas Rountev
SCAM
2007
IEEE
14 years 5 months ago
The Programmer's Lexicon, Volume I: The Verbs
ames make or break abstractions: good ones communicate the intention of the method, whereas bad ones cause confusion and frustration. The task of naming is subject to the whims an...
Einar W. Høst, Bjarte M. Østvold
SCAM
2007
IEEE
14 years 5 months ago
An Evaluation of Slicing Algorithms for Concurrent Programs
Program slicing is a program-reduction technique for extracting statements that may influence other statements. While there exist efficient algorithms to slice sequential progra...
Dennis Giffhorn, Christian Hammer
SCAM
2007
IEEE
14 years 5 months ago
Quality Assessment for Embedded SQL
—The access of information systems to underlying relational databases is commonly programmed using embedded SQL queries. Such embedded queries may take the form of string literal...
Huib van den Brink, Rob van der Leek, Joost Visser
SCAM
2007
IEEE
14 years 5 months ago
Barrier Slicing for Remote Software Trusting
Remote trusting aims at verifying the “healthy” execution of a program running on an untrusted client that communicates with a trusted server via network connection. After giv...
Mariano Ceccato, Mila Dalla Preda, Jasvir Nagra, C...