Sciweavers

677 search results - page 114 / 136
» Reverse Engineering Super-Repositories
Sort
View
WCRE
2009
IEEE
14 years 2 months ago
Automatic Static Unpacking of Malware Binaries
—Current malware is often transmitted in packed or encrypted form to prevent examination by anti-virus software. To analyze new malware, researchers typically resort to dynamic c...
Kevin Coogan, Saumya K. Debray, Tasneem Kaochar, G...
WCRE
2009
IEEE
14 years 2 months ago
Benchmarking Lightweight Techniques to Link E-Mails and Source Code
—During the evolution of a software system, a large amount of information, which is not always directly related to the source code, is produced. Several researchers have provided...
Alberto Bacchelli, Marco D'Ambros, Michele Lanza, ...
WCRE
2009
IEEE
14 years 2 months ago
Domain Feature Model Recovery from Multiple Applications Using Data Access Semantics and Formal Concept Analysis
Feature models are widely employed in domainspecific software development to specify the domain requirements with commonality and variability. A feature model is usually construct...
Yiming Yang, Xin Peng, Wenyun Zhao
WCRE
2009
IEEE
14 years 2 months ago
Autumn Leaves: Curing the Window Plague in IDEs
—Navigating large software systems is difficult as the various artifacts are distributed in a huge space, while the relationships between different artifacts often remain hidden...
David Röthlisberger, Oscar Nierstrasz, St&eac...
COMSWARE
2008
IEEE
14 years 2 months ago
Network coding for TCP throughput enhancement over a multi-hop wireless network
—The poor performance of TCP over multi-hop wireless networks is well known. In this paper we explore to what extent network coding can help to improve the throughput performance...
P. Samuel David, Anurag Kumar