Sciweavers

889 search results - page 27 / 178
» Analysis of Software Engineering Data Using Computational In...
Sort
View
ICSM
2006
IEEE
14 years 2 months ago
Working Session: Information Retrieval Based Approaches in Software Evolution
During software evolution a collection of related artifacts with different representations are created. Some of these are composed of structured data (e.g., analysis data), some c...
Andrian Marcus, Andrea De Lucia, Jane Huffman Haye...
WCRE
2010
IEEE
13 years 7 months ago
Reverse Engineering Self-Modifying Code: Unpacker Extraction
—An important application of binary-level reverse engineering is in reconstructing the internal logic of computer malware. Most malware code is distributed in encrypted (or “pa...
Saumya K. Debray, Jay Patel
UIST
2009
ACM
14 years 3 months ago
Activity analysis enabling real-time video communication on mobile phones for deaf users
We describe our system called MobileASL for real-time video communication on the current U.S. mobile phone network. The goal of MobileASL is to enable Deaf people to communicate w...
Neva Cherniavsky, Jaehong Chon, Jacob O. Wobbrock,...
PASTE
1998
ACM
14 years 6 days ago
Efficient Composite Data Flow Analysis Applied to Concurrent Programs
FLAVERS, a tool for verifying properties of concurrent systems, uses composite data flow analysis to incrementally improve the precision of the results of its verifications. Altho...
Gleb Naumovich, Lori A. Clarke, Leon J. Osterweil
ICSE
1999
IEEE-ACM
14 years 27 days ago
Data Flow Analysis for Checking Properties of Concurrent Java Programs
In this paper we show how the FLAVERS data flow analysis technique, originally formulated for programs with the rendezvous model of concurrency, can be applied to concurrent Java...
Gleb Naumovich, George S. Avrunin, Lori A. Clarke