36 papers:
- ITiCSE-2015-BlauM #automation #feedback #java #student
- FrenchPress Gives Students Automated Feedback on Java Program Flaws (HB, JEBM), pp. 15–20.
- FM-2015-BagheriKMJ #android #bound #design #detection #protocol #verification
- Detection of Design Flaws in the Android Permission Protocol Through Bounded Verification (HB, EK, SM, DJ), pp. 73–89.
- ASE-2013-VanciuA #architecture #constraints #using
- Finding architectural flaws using constraints (RV, MAA), pp. 334–344.
- SIGIR-2012-AnderkaSL #predict #quality #wiki
- Predicting quality flaws in user-generated content: the case of wikipedia (MA, BS, NL), pp. 981–990.
- SAC-2012-FerrariGT #approach #clustering #requirements #specification
- A clustering-based approach for discovering flaws in requirements specifications (AF, SG, GT), pp. 1043–1050.
- SCAM-2011-MarinescuM #fault #question
- Are the Clients of Flawed Classes (Also) Defect Prone? (RM, CM), pp. 65–74.
- WCRE-2011-CodobanMM #design #fault #named #problem
- iProblems — An Integrated Instrument for Reporting Design Flaws, Vulnerabilities and Defects (MC, CM, RM), pp. 437–438.
- CIKM-2011-AnderkaSL #classification #detection #problem #quality
- Detection of text quality flaws as a one-class classification problem (MA, BS, NL), pp. 2313–2316.
- SEKE-2011-BudiLLJW #architecture #automation #design #detection
- Automated Detection of Likely Design Flaws in N-Tier Architectures (AB, L, DL, LJ, SW), pp. 613–618.
- WCRE-1999-ButlerWYS99a #empirical #identifier #quality
- Relating Identifier Naming Flaws and Code Quality: An Empirical Study (SB, MW, YY, HS), pp. 31–35.
- ICSM-2008-Lozano #source code
- A methodology to assess the impact of source code flaws in changeability, and its application to clones (AL), pp. 424–427.
- SAC-OOPS-J-2006-BeugnardS07 #encapsulation
- Method Overloading and Overriding Cause Distribution Transparency and Encapsulation Flaws (AB, SS), pp. 31–45.
- ICSE-2007-PistoiaFFY #enterprise #modelling #policy #security #validation
- When Role Models Have Flaws: Static Validation of Enterprise Security Policies (MP, SJF, RJF, EY), pp. 478–488.
- DAC-2006-SrinivasanMXVS #named
- FLAW: FPGA lifetime awareness (SS, PM, YX, NV, KS), pp. 630–635.
- DAC-2006-WagnerBA #design #logic
- Shielding against design flaws with field repairable control logic (IW, VB, TMA), pp. 344–347.
- ICPC-2006-SalehieLT #design #detection #framework #heuristic #object-oriented
- A Metric-Based Heuristic Framework to Detect Object-Oriented Design Flaws (MS, SL, LT), pp. 159–168.
- SAC-2006-Beugnard #assembly #component #empirical #encapsulation
- Method overloading and overriding cause encapsulation flaw: an experiment on assembly of heterogeneous components (AB), pp. 1424–1428.
- CSMR-2005-MihanceaM #automation #design #detection #object-oriented #optimisation #towards
- Towards the Optimization of Automatic Detection of Design Flaws in Object-Oriented Software Systems (PFM, RM), pp. 92–101.
- OOPSLA-2005-MartinLL #fault #query #security #using
- Finding application errors and security flaws using PQL: a program query language (MCM, VBL, MSL), pp. 365–383.
- SAC-2005-FernandezS #analysis #modelling
- An analysis of modeling flaws in HL7 and JAHIS (EBF, TS), pp. 216–223.
- LDTA-2005-Kreimer #adaptation #design #detection
- Adaptive Detection of Design Flaws (JK), pp. 117–136.
- CSMR-2004-RatiuDGM #design #detection #using
- Using History Information to Improve Design Flaws Detection (DR, SD, TG, RM), pp. 223–232.
- CSMR-2004-TrifuSG #automation #design #object-oriented
- Automated Design Flaw Correction in Object-Oriented Systems (AT, OS, TG), pp. 174–183.
- ICSM-2004-Marinescu #design #detection
- Detection Strategies: Metrics-Based Rules for Detecting Design Flaws (RM), pp. 350–359.
- TOOLS-USA-2001-Marinescu #design #detection #metric #object-oriented
- Detecting Design Flaws via Metrics in Object-Oriented Systems (RM), pp. 173–182.
- IJCAR-2001-ReifST #detection #specification
- Flaw Detection in Formal Specifications (WR, GS, AT), pp. 642–657.
- ICPR-v4-2000-BodnarovaBL #detection #using
- Textile Flaw Detection Using Optimal Gabor Filters (AB, MB, SJL), pp. 4799–4802.
- ICPR-v4-2000-MamicB #automation #detection #using
- Automatic Flaw Detection in Textiles Using a Neyman-Pearson Detector (GJM, MB), pp. 4767–4770.
- ASE-1999-MiceliSG #design #detection #metric
- A Metric Based Technique for Design Flaws Detection and Correction (TM, HAS, RG), pp. 307–310.
- ISSTA-1998-TraceyCM #automation #using
- Automated Program Flaw Finding Using Simulated Annealing (NT, JAC, KM), pp. 73–81.
- SIGMOD-1996-Tajima #database #detection #object-oriented #security #static analysis
- Static Detection of Security Flaws in Object-Oriented Databases (KT), pp. 341–352.
- ICML-1996-EngelsonK #identification
- Identifying the Information Contained in a Flawed Theory (SPE, MK), pp. 131–138.
- ICML-1994-KoppelSF
- Getting the Most from Flawed Theories (MK, AMS, RF), pp. 139–147.
- SOSP-WIP-1991-Druschel92 #architecture #composition #kernel #orthogonal #why
- Modularity and Protection are Orthogonal, or “Why µ-kernel Architectures are Flawed” (Abstract) (PD), p. 22.
- KBSE-1991-FrinckeAL #algorithm #approach #automation #concurrent #detection #named
- CTPLAN: A Planning-Based Approach to Automatically Detecting Flaws in Concurrent Algorithms (DAF, MA, KNL), pp. 151–160.
- CAiSE-1989-Kingsbury #development #problem
- Systems Development: Basic Flaws in the Current Culture — Ideas for Rectifying Some of the Problems (MAK).