IIIT-Delhi Institutional Repository

Browsing by Author "Purandare, Rahul (Advisor)"

Browsing by Author "Purandare, Rahul (Advisor)"

Sort by: Order: Results:

  • Dhar, Aritra; Purandare, Rahul (Advisor) (2014-12-12)
    Programs are susceptible to malformed data coming from untrusted sources. Occasionally the programming logic or constructs used are inappropriate to handle all types of constraints that are imposed by legal and well-formed ...
  • Malhotra, Hrithik; Purandare, Rahul (Advisor) (IIIT-Delhi, 2021-12)
    Code clones are duplicate code fragments that share (nearly) similar syntax or semantics. Code clone detection plays an important role in software maintenance, code refactoring, and reuse. Most of the techniques for code ...
  • Vinayakarao, Venkatesh; Purandare, Rahul (Advisor) (IIIT-Delhi, 2018-04)
    Code variants represent alternative implementations of a code snippet, where each alternative provides the same functionality, but has different properties that make some of them better suited to the overall project ...
  • Singh, Sejal; Purandare, Rahul (Advisor); Jain, Ridhi (Advisor) (IIIT-Delhi, 2021-06)
    C decompilers are often chosen by the developers when they do not have the source code available in order to either debug or understand the code. Previous studies suggest that the C decompilers are not correct; however, ...
  • Khilariwal, Vishisht; Purandare, Rahul (Advisor) (2017-07-05)
    Memory or RAM of a device contains a lot of data.This work focuses on how to ensure security of our critical data like our passwords or encryption keys stored in the memory which if become public can pose a big security ...
  • Sondhi, Devika; Purandare, Rahul (Advisor) (IIIT- Delhi, 2021-06)
    With the ever-growing dependency on software, testing for their unexpected behavior is as important as verifying for their known properties, to avoid potential losses. Existing software testing approaches assume either ...
  • Anwer, Samit; Purandare, Rahul (Advisor) (2014-12-12)
    Every Android application runs in its own virtual machine, with its own Linux user account and corresponding permissions. Although this ensures that permissions are given as per each application’s requirements, each ...
  • Kochanthara, Sangeeth; Purandare, Rahul (Advisor) (2016-11-01)
    Real-time systems are becoming more complex and open, thus increasing their development and verification costs. Although several static verification tools have been proposed over the last decades, they suffer from scalability ...
  • Agarwal, Navdha; Purandare, Rahul (Advisor) (IIIT-Delhi, 2020-06-03)
    Code clone detection plays an important role in software maintenance and evolution. There are many new applications emerging that rely on clones detected across software systems, and hence to address this, many code clone ...
  • Aggarwal, Aniya; Purandare, Rahul (Advisor) (2014-12-12)
    Each Android application (app) runs in its own virtual machine (VM), with every VM allocated a limited heap size for creating new objects. The heap size is scarce and device dependent. The more heap space an app uses, ...
  • Chopra, Bhavya; Purandare, Rahul (Advisor) (IIIT-Delhi, 2022-05)
    Assertions are often used by programmers to test assumptions that they have about the program. Meaningful assertions often help in early detection of bugs, and also help developers in understanding the working of their ...
  • Yadav, Khushbu; Purandare, Rahul (Advisor) (IIIT-Delhi, 2020-08)
    Java being designed in a flexible and user-friendly demeanour, makes it the most accepted programming language for the development of web applications and platforms. Due to the immense popularity, there comes the responsibility ...
  • Sharma, Abhinav; Purandare, Rahul (Advisor) (IIIT-Delhi, 2021-05)
    Commenting is described as the process of placing Human Readable Descriptions within a com- puter program/code that summarizes the functionality of the code within which the description is written. The strength of a good ...

Search Repository

Browse

My Account