Sciweavers

70 search results - page 9 / 14
» Reverse engineering under siege
Sort
View
3DPVT
2006
IEEE
216views Visualization» more  3DPVT 2006»
14 years 1 months ago
Object Modeling with Guaranteed Fulfillment of Geometric Constraints
Object modeling under consideration of geometric constraints is an important task. In this paper we describe a novel approach to achieving this goal. It has the nice property that...
Da-Chuan Cheng, Xiaoyi Jiang
JUCS
2007
80views more  JUCS 2007»
13 years 9 months ago
Higher-Order Lazy Functional Slicing
: Program slicing is a well known family of techniques intended to identify and isolate code fragments which depend on, or are depended upon, specific program entities. This is pa...
Nuno F. Rodrigues, Luís Soares Barbosa
KBSE
2005
IEEE
14 years 3 months ago
On dynamic feature location
Feature location aims at locating pieces of code that implement a given set of features (requirements). It is a necessary first step in every program comprehension and maintenanc...
Rainer Koschke, Jochen Quante
IWPC
2009
IEEE
14 years 4 months ago
The effectiveness of source code obfuscation: An experimental assessment
Source code obfuscation is a protection mechanism widely used to limit the possibility of malicious reverse engineering or attack activities on a software system. Although several...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...
ICSM
2000
IEEE
14 years 2 months ago
Bridging Program Comprehension Tools by Design Navigation
Source code investigation is one of the most time consuming activities during software maintenance and evolution, yet currently available tool support suffers from several shortco...
Sébastien Robitaille, Reinhard Schauer, Rud...