Sciweavers

121 search results - page 13 / 25
» An evaluation of reverse engineering tool capabilities
Sort
View
APSEC
2010
IEEE
12 years 11 months ago
Evaluating Cloud Platform Architecture with the CARE Framework
There is an emergence of cloud application platforms such as Microsoft’s Azure, Google’s App Engine and Amazon’s EC2/SimpleDB/S3. Startups and Enterprise alike, lured by the...
Liang Zhao, Anna Liu, Jacky Keung
IWPC
2009
IEEE
14 years 2 months ago
The effectiveness of source code obfuscation: An experimental assessment
Source code obfuscation is a protection mechanism widely used to limit the possibility of malicious reverse engineering or attack activities on a software system. Although several...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...
SIGSOFT
2006
ACM
14 years 1 months ago
Memories of bug fixes
The change history of a software project contains a rich collection of code changes that record previous development experience. Changes that fix bugs are especially interesting, ...
Sunghun Kim, Kai Pan, E. James Whitehead Jr.
MICRO
2002
IEEE
97views Hardware» more  MICRO 2002»
14 years 25 days ago
Three extensions to register integration
Register integration (or just integration) is a register renaming discipline that implements instruction reuse via physical register sharing. Initially developed to perform squash...
Vlad Petric, Anne Bracy, Amir Roth
IUI
2006
ACM
14 years 1 months ago
Recovering semantic relations from web pages based on visual cues
Recovering semantic relations between different parts of web pages are of great importance for multi-platform web interface development, as they make it possible to re-distribute ...
Peifeng Xiang, Yuanchun Shi