Sciweavers

1143 search results - page 141 / 229
» Extraction in software watermarking
Sort
View
ICSM
2002
IEEE
14 years 2 months ago
Migration to Object Oriented Platforms: A State Transformation Approach
Over the past years it has become evident that the benefits of object orientation warrant the design and development of reengineering methods that aim to migrate legacy procedural...
Ying Zou, Kostas Kontogiannis
KBSE
1999
IEEE
14 years 1 months ago
An Integration of Deductive Retrieval into Deductive Synthesis
Deductive retrieval and deductive synthesis are two conceptually closely related software development methods which apply theorem proving techniques to support the construction of...
Bernd Fischer 0002, Jon Whittle
AOSD
2007
ACM
14 years 1 months ago
Efficiently mining crosscutting concerns through random walks
Inspired by our past manual aspect mining experiences, this paper describes a random walk model to approximate how crosscutting concerns can be discovered in the absence of domain...
Charles Zhang, Hans-Arno Jacobsen
ACSAC
2004
IEEE
14 years 27 days ago
Static Analyzer of Vicious Executables (SAVE)
Software security assurance and malware (trojans, worms, and viruses, etc.) detection are important topics of information security. Software obfuscation, a general technique that ...
Andrew H. Sung, Jianyun Xu, Patrick Chavez, Sriniv...
ICSE
2000
IEEE-ACM
14 years 22 days ago
Improving problem-oriented mailing list archives with MCS
Developers often use electronic mailing lists when seeking assistance with a particular software application. The archives of these mailing lists provide a rich repository of prob...
Robert S. Brewer