Sciweavers

1719 search results - page 233 / 344
» Software Re-Documentation Process and Tool
Sort
View
108
Voted
SIGSOFT
2005
ACM
16 years 4 months ago
ASTEC: a new approach to refactoring C
The C language is among the most widely used in the world, particularly for critical infrastructure software. C programs depend upon macros processed using the C preprocessor, but...
Bill McCloskey, Eric A. Brewer
CHI
2005
ACM
16 years 4 months ago
Privacy and proportionality: adapting legal evaluation techniques to inform design in ubiquitous computing
We argue that an analytic proportionality assessment balancing usefulness and burden on individual or group privacy must be conducted throughout the design process to create accep...
Giovanni Iachello, Gregory D. Abowd
133
Voted
ACSC
2006
IEEE
15 years 10 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson
IUI
2000
ACM
15 years 8 months ago
A perceptual assistant to do sound equalization
This paper describes an intelligent interface to assist in the expert perceptual task of sound equalization. This is commonly done by a sound engineer in a recording studio, live ...
Dale Reed
DAC
1999
ACM
15 years 8 months ago
ipChinook: an Integrated IP-based Design Framework for Distributed Embedded Systems
IPCHINOOK is a design tool for distributed embedded systems. It gains leverage from the use of a carefully chosen set of design ions that raise the level of designer interaction d...
Pai H. Chou, Ross B. Ortega, Ken Hines, Kurt Partr...