Sciweavers

761 search results - page 57 / 153
» Reverse engineering MAC
Sort
View
GECCO
2005
Springer
108views Optimization» more  GECCO 2005»
14 years 1 months ago
Hybridizing evolutionary algorithms and clustering algorithms to find source-code clones
This paper presents a hybrid approach to detect source-code clones that combines evolutionary algorithms and clustering. A case-study is conducted on a small C++ code base. The pr...
Andrew Sutton, Huzefa H. Kagdi, Jonathan I. Maleti...
ICSM
1999
IEEE
14 years 11 days ago
Recovering High-Level Views of Object-Oriented Applications from Static and Dynamic Information
Recovering architectural documentation from code is crucial to maintaining and reengineering software systems. Reverse engineering and program understanding approaches are often l...
Tamar Richner, Stéphane Ducasse
TSE
2010
280views more  TSE 2010»
13 years 6 months ago
How Reliable Are Systematic Reviews in Empirical Software Engineering?
BACKGROUND – the systematic review is becoming a more commonly employed research instrument in empirical software engineering. Before undue reliance is placed on the outcomes of...
Stephen G. MacDonell, Martin J. Shepperd, Barbara ...
CCS
2008
ACM
13 years 10 months ago
Towards experimental evaluation of code obfuscation techniques
While many obfuscation schemes proposed, none of them satisfy any strong definition of obfuscation. Furthermore secure generalpurpose obfuscation algorithms have been proven to be...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...
CG
2006
Springer
13 years 8 months ago
Shape reasoning and understanding
s: clustering, denoising, sharp feature, shape abstraction, reverse engineering In this paper we describe a hierarchical face clustering algorithm for triangle meshes based on fit...
Bianca Falcidieno, Remco C. Veltkamp