BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
detect (16)
design (12)
use (6)
base (5)
orient (5)

Stem flaw$ (all stems)

36 papers:

ITiCSEITiCSE-2015-BlauM #automation #feedback #java #student
FrenchPress Gives Students Automated Feedback on Java Program Flaws (HB, JEBM), pp. 15–20.
FMFM-2015-BagheriKMJ #android #bound #design #detection #protocol #verification
Detection of Design Flaws in the Android Permission Protocol Through Bounded Verification (HB, EK, SM, DJ), pp. 73–89.
ASEASE-2013-VanciuA #architecture #constraints #using
Finding architectural flaws using constraints (RV, MAA), pp. 334–344.
SIGIRSIGIR-2012-AnderkaSL #predict #quality #wiki
Predicting quality flaws in user-generated content: the case of wikipedia (MA, BS, NL), pp. 981–990.
SACSAC-2012-FerrariGT #approach #clustering #requirements #specification
A clustering-based approach for discovering flaws in requirements specifications (AF, SG, GT), pp. 1043–1050.
SCAMSCAM-2011-MarinescuM #fault #question
Are the Clients of Flawed Classes (Also) Defect Prone? (RM, CM), pp. 65–74.
WCREWCRE-2011-CodobanMM #design #fault #named #problem
iProblems — An Integrated Instrument for Reporting Design Flaws, Vulnerabilities and Defects (MC, CM, RM), pp. 437–438.
CIKMCIKM-2011-AnderkaSL #classification #detection #problem #quality
Detection of text quality flaws as a one-class classification problem (MA, BS, NL), pp. 2313–2316.
SEKESEKE-2011-BudiLLJW #architecture #automation #design #detection
Automated Detection of Likely Design Flaws in N-Tier Architectures (AB, L, DL, LJ, SW), pp. 613–618.
WCREWCRE-1999-ButlerWYS99a #empirical #identifier #quality
Relating Identifier Naming Flaws and Code Quality: An Empirical Study (SB, MW, YY, HS), pp. 31–35.
ICSMEICSM-2008-Lozano #source code
A methodology to assess the impact of source code flaws in changeability, and its application to clones (AL), pp. 424–427.
SACSAC-OOPS-J-2006-BeugnardS07 #encapsulation
Method Overloading and Overriding Cause Distribution Transparency and Encapsulation Flaws (AB, SS), pp. 31–45.
ICSEICSE-2007-PistoiaFFY #enterprise #modelling #policy #security #validation
When Role Models Have Flaws: Static Validation of Enterprise Security Policies (MP, SJF, RJF, EY), pp. 478–488.
DACDAC-2006-SrinivasanMXVS #named
FLAW: FPGA lifetime awareness (SS, PM, YX, NV, KS), pp. 630–635.
DACDAC-2006-WagnerBA #design #logic
Shielding against design flaws with field repairable control logic (IW, VB, TMA), pp. 344–347.
ICPCICPC-2006-SalehieLT #design #detection #framework #heuristic #object-oriented
A Metric-Based Heuristic Framework to Detect Object-Oriented Design Flaws (MS, SL, LT), pp. 159–168.
SACSAC-2006-Beugnard #assembly #component #empirical #encapsulation
Method overloading and overriding cause encapsulation flaw: an experiment on assembly of heterogeneous components (AB), pp. 1424–1428.
CSMRCSMR-2005-MihanceaM #automation #design #detection #object-oriented #optimisation #towards
Towards the Optimization of Automatic Detection of Design Flaws in Object-Oriented Software Systems (PFM, RM), pp. 92–101.
OOPSLAOOPSLA-2005-MartinLL #fault #query #security #using
Finding application errors and security flaws using PQL: a program query language (MCM, VBL, MSL), pp. 365–383.
SACSAC-2005-FernandezS #analysis #modelling
An analysis of modeling flaws in HL7 and JAHIS (EBF, TS), pp. 216–223.
LDTALDTA-2005-Kreimer #adaptation #design #detection
Adaptive Detection of Design Flaws (JK), pp. 117–136.
CSMRCSMR-2004-RatiuDGM #design #detection #using
Using History Information to Improve Design Flaws Detection (DR, SD, TG, RM), pp. 223–232.
CSMRCSMR-2004-TrifuSG #automation #design #object-oriented
Automated Design Flaw Correction in Object-Oriented Systems (AT, OS, TG), pp. 174–183.
ICSMEICSM-2004-Marinescu #design #detection
Detection Strategies: Metrics-Based Rules for Detecting Design Flaws (RM), pp. 350–359.
TOOLSTOOLS-USA-2001-Marinescu #design #detection #metric #object-oriented
Detecting Design Flaws via Metrics in Object-Oriented Systems (RM), pp. 173–182.
IJCARIJCAR-2001-ReifST #detection #specification
Flaw Detection in Formal Specifications (WR, GS, AT), pp. 642–657.
ICPRICPR-v4-2000-BodnarovaBL #detection #using
Textile Flaw Detection Using Optimal Gabor Filters (AB, MB, SJL), pp. 4799–4802.
ICPRICPR-v4-2000-MamicB #automation #detection #using
Automatic Flaw Detection in Textiles Using a Neyman-Pearson Detector (GJM, MB), pp. 4767–4770.
ASEASE-1999-MiceliSG #design #detection #metric
A Metric Based Technique for Design Flaws Detection and Correction (TM, HAS, RG), pp. 307–310.
ISSTAISSTA-1998-TraceyCM #automation #using
Automated Program Flaw Finding Using Simulated Annealing (NT, JAC, KM), pp. 73–81.
SIGMODSIGMOD-1996-Tajima #database #detection #object-oriented #security #static analysis
Static Detection of Security Flaws in Object-Oriented Databases (KT), pp. 341–352.
ICMLICML-1996-EngelsonK #identification
Identifying the Information Contained in a Flawed Theory (SPE, MK), pp. 131–138.
ICMLICML-1994-KoppelSF
Getting the Most from Flawed Theories (MK, AMS, RF), pp. 139–147.
SOSPSOSP-WIP-1991-Druschel92 #architecture #composition #kernel #orthogonal #why
Modularity and Protection are Orthogonal, or “Why µ-kernel Architectures are Flawed” (Abstract) (PD), p. 22.
ASEKBSE-1991-FrinckeAL #algorithm #approach #automation #concurrent #detection #named
CTPLAN: A Planning-Based Approach to Automatically Detecting Flaws in Concurrent Algorithms (DAF, MA, KNL), pp. 151–160.
CAiSECAiSE-1989-Kingsbury #development #problem
Systems Development: Basic Flaws in the Current Culture — Ideas for Rectifying Some of the Problems (MAK).

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.