Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries may photocopy beyond the limits of US copyright law, for private use of patrons, those articles in this volume that carr...
Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries may photocopy beyond the limits of US copyright law, for private use of patrons, those articles in this volume that carry a code at the bottom of the first page, provided that the per-copy fee indicated in the code is paid through the Copyright Clearance Center. The papers in this book comprise the proceedings of the meeting mentioned on the cover and title page. They reflect the authors' opinions and, in the interests of timely dissemination, are published as presented and without change. Their inclusion in this publication does not necessarily constitute endorsement by the editors or the Institute of Electrical and Electronics Engineers, Inc.
Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries may photocopy beyond the limits of US copyright law, for private use of patrons, those articles in this volume that carr...
Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries may photocopy beyond the limits of US copyright law, for private use of patrons, those articles in this volume that carry a code at the bottom of the first page, provided that the per-copy fee indicated in the code is paid through the Copyright Clearance Center. The papers in this book comprise the proceedings of the meeting mentioned on the cover and title page. They reflect the authors' opinions and, in the interests of timely dissemination, are published as presented and without change. Their inclusion in this publication does not necessarily constitute endorsement by the editors or the Institute of Electrical and Electronics Engineers, Inc.
The April 2013 Special Issue of The Institution of Engineering and Technology deals with papers discussed in the 11th ieeeinternational Working Conference on sourcecodeanalysis and manipulation. Eric Larson's p...
详细信息
The April 2013 Special Issue of The Institution of Engineering and Technology deals with papers discussed in the 11th ieeeinternational Working Conference on sourcecodeanalysis and manipulation. Eric Larson's paper on 'Program analysis Too Loopy? Set the Loops Aside' argues that it is possible to use loop summaries in the analysis instead of the loops themselves and investigates what would be the benefit of such an approach. The analysis pointed out some interesting statistics from the point of view of certain programming constructs that make loop analyses difficult. Minhaz F. Zibran, Chanchal K. Roy's paper titled 'Conflict-aware Optimal Scheduling of Prioritized code Clone Refactoring' discusses a constraint programming approach to schedule refactorings of code clones. The proposed effort model integrates a number of factors including context understanding, code modification and navigation, which is an interesting novel approach.
We present an automated fault localization technique that can assist developers to localize effectively faults in Python programs. The proposed method uses spectrum-based fault localization techniques, program slicing...
详细信息
ISBN:
(数字)9798331534677
ISBN:
(纸本)9798331534684
We present an automated fault localization technique that can assist developers to localize effectively faults in Python programs. The proposed method uses spectrum-based fault localization techniques, program slicing, and graph-based visualization to formulate an efficient method for reducing the effort needed in fault localization. The approach takes the sourcecode of a program, a set of passed and failed tests and collects the program spectra information by executing the tests. A tool, FaultLocalizer, facilitates the generation of a call graph for inter-procedural dependency analysis and annotated control flow graphs for different modules with spectra information and suspiciousness scores. The focus of the approach is on the visual analysis of the sourcecode, and it is intended to complement existing fault localization approaches. The effectiveness of the proposed approach is evaluated on a set of buggy Python programs. The results show that the approach reduces debugging efforts and can be applied to programs with conditional branching.
The proceedings contain 24 papers. The topics discussed include: vulnerability prediction models: a case study on the Linux kernel;assessment of sourcecode obfuscation techniques;a security perspective on code review...
ISBN:
(纸本)9781509038503
The proceedings contain 24 papers. The topics discussed include: vulnerability prediction models: a case study on the Linux kernel;assessment of sourcecode obfuscation techniques;a security perspective on code review: the case of chromium;a source-level energy optimization framework for mobile applications;collective intelligence for smarter API recommendations in python;augur: incorporating hidden dependencies and variable granularity in change impact analysis;statically-informed dynamic analysis tools to detect algorithmic complexity vulnerabilities;a program interpreter framework for arbitrary abstractions;and similarity of sourcecode in the presence of pervasive modifications.
暂无评论