Sciweavers

677 search results - page 119 / 136
» Reverse Engineering Super-Repositories
Sort
View
WCRE
2005
IEEE
14 years 1 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean
AOSD
2005
ACM
14 years 1 months ago
Towards just-in-time middleware architectures
Middleware becomes increasingly important in building distributed applications. Conventional middleware systems are designed, implemented, and packaged before applications are dev...
Charles Zhang, Dapeng Gao, Hans-Arno Jacobsen
ATAL
2005
Springer
14 years 1 months ago
Comprehending agent software
Software comprehension (understanding software structure and behavior) is essential for developing, maintaining, and improving software. This is particularly true of agent-based s...
Dung N. Lam, K. Suzanne Barber
OOPSLA
2005
Springer
14 years 1 months ago
Using refactorings to automatically update component-based applications
Frameworks and libraries change their APIs during evolution. Migrating an application to the new API is tedious and disrupts the development process. Although some tools and techn...
Danny Dig
WCRE
2003
IEEE
14 years 29 days ago
Analyzing Large Spreadsheet Programs
Although the results of spreadsheet programs are the base for very important decisions and are subject to many changes, they are only poorly documented. In this paper we introduce...
Markus Clermont