Sciweavers

1281 search results - page 89 / 257
» Software Visualization for Reverse Engineering
Sort
View
CSMR
2005
IEEE
14 years 2 months ago
Applying Webmining Techniques to Execution Traces to Support the Program Comprehension Process
Well-designed object-oriented programs typically consist of a few key classes that work tightly together to provide the bulk of the functionality. As such, these key classes are e...
Andy Zaidman, Toon Calders, Serge Demeyer, Jan Par...
PASTE
2005
ACM
14 years 2 months ago
String analysis for x86 binaries
Information about string values at key points in a program can help program understanding, reverse engineering, and forensics. We present a static-analysis technique for recoverin...
Mihai Christodorescu, Nicholas Kidd, Wen-Han Goh
KBSE
2003
IEEE
14 years 2 months ago
Unspeculation
Modern architectures, such as the Intel Itanium, support speculation, a hardware mechanism that allows the early execution of expensive operations—possibly even before it is kno...
Noah Snavely, Saumya K. Debray, Gregory R. Andrews
WCRE
2000
IEEE
14 years 1 months ago
A Structured Demonstration of Program Comprehension Tools
This paper describes a structured tool demonstration, a hybrid evaluation technique that combines elements from experiments, case studies, and technology demonstrations. Developer...
Susan Elliott Sim, Margaret-Anne D. Storey
CSMR
2010
IEEE
13 years 3 months ago
Under and Over Approximation of State Models Recovered for Ajax Applications
Abstract--In contrast to conventional multi-page Web applications, an Ajax application is developed as a single-page application in which content and structure are changed at runti...
Alessandro Marchetto, Paolo Tonella, Filippo Ricca