Sfoglia per Rivista EMPIRICAL SOFTWARE ENGINEERING
Generating valid grammar-based test inputs by means of genetic programming and annotated grammars
2017-01-01 Kifetew, Fitsum Meshesha; Tiella, Roberto; Tonella, Paolo
Labeling source code with information retrieval methods: an empirical study
2013-01-01 Andrea De, Lucia; Massimiliano Di, Penta; Rocco, Oliveto; Panichella, Annibale; Sebastiano, Panichella
A large study on the effect of code obfuscation on the quality of java code
2015-01-01 Ceccato, Mariano; Capiluppi, Andrea; Falcarin, Paolo; Boldyreff, Cornelia
Security analysis of permission re-delegation vulnerabilities in Android apps
2020-01-01 Demissie, Biniam Fisseha; Ceccato, Mariano; Shar, Lwin Khin
Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge
2019-01-01 Ceccato, Mariano; Tonella, Paolo; Basile, Cataldo; Falcarin, Paolo; Torchiano, Marco; Coppens, Bart; De Sutter, Bjorn
Using search-based algorithms for Ajax event sequence generation during testing
2011-01-01 Marchetto, Alessandro; Tonella, Paolo
Weighing lexical information for software clustering in the context of architecture recovery
2016-01-01 Anna, Corazza; Sergio Di, Martino; Maggio, Valerio; Giuseppe, Scanniello
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Generating valid grammar-based test inputs by means of genetic programming and annotated grammars | 1-gen-2017 | Kifetew, Fitsum Meshesha; Tiella, Roberto; Tonella, Paolo | |
Labeling source code with information retrieval methods: an empirical study | 1-gen-2013 | Andrea De, Lucia; Massimiliano Di, Penta; Rocco, Oliveto; Panichella, Annibale; Sebastiano, Panichella | |
A large study on the effect of code obfuscation on the quality of java code | 1-gen-2015 | Ceccato, Mariano; Capiluppi, Andrea; Falcarin, Paolo; Boldyreff, Cornelia | |
Security analysis of permission re-delegation vulnerabilities in Android apps | 1-gen-2020 | Demissie, Biniam Fisseha; Ceccato, Mariano; Shar, Lwin Khin | |
Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge | 1-gen-2019 | Ceccato, Mariano; Tonella, Paolo; Basile, Cataldo; Falcarin, Paolo; Torchiano, Marco; Coppens, Bart; De Sutter, Bjorn | |
Using search-based algorithms for Ajax event sequence generation during testing | 1-gen-2011 | Marchetto, Alessandro; Tonella, Paolo | |
Weighing lexical information for software clustering in the context of architecture recovery | 1-gen-2016 | Anna, Corazza; Sergio Di, Martino; Maggio, Valerio; Giuseppe, Scanniello |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile