Sciweavers

726 search results - page 111 / 146
» Reverse engineering: a roadmap
Sort
View
WCRE
2008
IEEE
14 years 4 months ago
Detecting Clones in Business Applications
A business application automates a collection of business processes. A business process describes how a set of logically related tasks are executed, ordered and managed by followi...
Jin Guo, Ying Zou
WCRE
2008
IEEE
14 years 4 months ago
An Empirical Study of Function Clones in Open Source Software
The new hybrid clone detection tool NICAD combines the strengths and overcomes the limitations of both textbased and AST-based clone detection techniques to yield highly accurate ...
Chanchal Kumar Roy, James R. Cordy
WCRE
2008
IEEE
14 years 4 months ago
Retrieving Task-Related Clusters from Change History
During software maintenance tasks, developers often spend an important amount of effort investigating source code. This effort can be reduced if tools are available to help develo...
Martin P. Robillard, Barthélémy Dage...
WCRE
2008
IEEE
14 years 4 months ago
Discovering New Change Patterns in Object-Oriented Systems
Modern software has to evolve to meet the needs of stakeholders; but the nature and scope of this evolution is difficult to anticipate and manage. In this paper, we examine techn...
Stéphane Vaucher, Houari A. Sahraoui, Jean ...
ACSAC
2007
IEEE
14 years 4 months ago
Spector: Automatically Analyzing Shell Code
Detecting the presence of buffer overflow attacks in network messages has been a major focus. Only knowing whether a message contains an attack, however, is not always enough to m...
Kevin Borders, Atul Prakash, Mark Zielinski