Sciweavers

1281 search results - page 123 / 257
» Software Visualization for Reverse Engineering
Sort
View
UIST
1995
ACM
14 years 16 days ago
Some Design Refinements and Principles on the Appearance and Behavior of Marking Menus
This paper describes some design refinements on marking menus and shows how these refinements embody interesting and relevant design principles for HCI. These refinements are base...
Mark A. Tapia, Gordon Kurtenbach
IUI
2009
ACM
14 years 3 months ago
A scientific workflow construction command line
Workflows have emerged as a common tool for scientists to express their computational analyses. While there are a multitude of visual data flow editors for workflow construction, ...
Paul T. Groth, Yolanda Gil
ICSM
2006
IEEE
14 years 3 months ago
Software Feature Understanding in an Industrial Setting
Software Engineers frequently need to locate and understand the code that implements a specific user feature of a large system. This paper reports on a study by Motorola Inc. and ...
Michael Jiang, Michael Groble, Sharon Simmons, Den...
IWPC
2009
IEEE
14 years 3 months ago
The effectiveness of source code obfuscation: An experimental assessment
Source code obfuscation is a protection mechanism widely used to limit the possibility of malicious reverse engineering or attack activities on a software system. Although several...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...
ICSM
2002
IEEE
14 years 1 months ago
Static and Dynamic C++ Code Analysis for the Recovery of the Object Diagram
When a software system enters the maintenance phase, the availability of accurate and consistent information about its organization can help alleviate the difficulties of program...
Paolo Tonella, Alessandra Potrich