Results 71 to 80 of about 18,338 (256)

A Systematic Mapping Study of the Metrics, Uses and Subjects of Diversity‐Based Testing Techniques

open access: yesSoftware Testing, Verification and Reliability, Volume 35, Issue 2, March 2025.
This paper is a systematic mapping study of diversity‐based testing (DBT) techniques that summarizes the key aspects and trends of 167 papers. The study reports the use of 79 similarity metrics with 22 types of software artefacts, which researchers have used to tackle 11 types of software testing problems.
Islam T. Elgendy   +2 more
wiley   +1 more source

Applying dynamic analysis to programs running in interpreted environments

open access: yesТруды Института системного программирования РАН, 2018
The present-day trends in software engineering include the steady increase of code and design complexity which reinforces the high demand in automated software testing and analysis tools.
S. P. Vartanov   +2 more
doaj   +1 more source

Enforcing Secure Object Initialization in Java [PDF]

open access: yes, 2010
Sun and the CERT recommend for secure Java development to not allow partially initialized objects to be accessed. The CERT considers the severity of the risks taken by not following this recommendation as high.
Hubert, Laurent   +3 more
core   +4 more sources

Safe design and evolution of smart contracts using dynamic condition response graphs to model generic role‐based behaviors

open access: yesJournal of Software: Evolution and Process, Volume 37, Issue 1, January 2025.
The paper introduces the use of dynamic condition response (DCR) Graphs for role‐based and declarative access control in smart contracts. This approach enhances the security and adaptability of smart contracts by enabling dynamic role adjustments and visualizing access control rights.
Yibin Xu   +4 more
wiley   +1 more source

DexMonitor: Dynamically Analyzing and Monitoring Obfuscated Android Applications

open access: yesIEEE Access, 2018
Both Android application developers and malware authors use sophisticated obfuscation tools to prevent their mobile applications from being repackaged and analyzed.
Haehyun Cho   +2 more
doaj   +1 more source

Provably Correct Control-Flow Graphs from Java Programs with Exceptions [PDF]

open access: yes, 2011
We present an algorithm to extract flow graphs from Java bytecode, focusing on exceptional control flows. We prove its correctness, meaning that the behaviour of the extracted control-flow graph is an over-approximation of the behaviour of the original ...
Amighi, Afshin   +2 more
core   +1 more source

A Compiler and Runtime Infrastructure for Automatic Program Distribution [PDF]

open access: yes, 2005
This paper presents the design and the implementation of a compiler and runtime infrastructure for automatic program distribution. We are building a research infrastructure that enables experimentation with various program partitioning and mapping ...
Chu, Matt   +3 more
core   +1 more source

Refactoring to Standard C++20 Modules

open access: yesJournal of Software: Evolution and Process, Volume 37, Issue 1, January 2025.
This paper investigates a semi‐automatic modularization method to refactor existing C++ projects. Our approach uses dependency analysis and clustering to organize elements of projects into modules, without domain‐specific information. To fully facilitate the use of Modules, it is likely that both project‐internal and user‐facing interfaces must be ...
Richárd Szalay, Zoltán Porkoláb
wiley   +1 more source

JBMC: A Bounded Model Checking Tool for Java Bytecode [PDF]

open access: green, 2023
Romain Brenguier   +3 more
openalex   +1 more source

Relational bytecode correlations

open access: yesThe Journal of Logic and Algebraic Programming, 2010
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire   +1 more source

Home - About - Disclaimer - Privacy