Sciweavers

787 search results - page 131 / 158
» Source code analysis and manipulation
Sort
View
ICSE
2003
IEEE-ACM
14 years 10 months ago
Using Process Technology to Control and Coordinate Software Adaptation
We have developed an infrastructure for end-to-end run-time monitoring, behavior/performance analysis, and dynamic adaptation of distributed software. This infrastructure is prima...
Giuseppe Valetto, Gail E. Kaiser
WCRE
2007
IEEE
14 years 4 months ago
Reverse Engineering Super-Repositories
Reverse engineering and software evolution research has been focused mostly on analyzing single software systems. However, rarely a project exists in isolation; instead, projects ...
Mircea Lungu, Michele Lanza, Tudor Gîrba, Re...
IRI
2006
IEEE
14 years 3 months ago
A similarity based technique for detecting malicious executable files for computer forensics
With the rapidly increasing complexity of computer systems and the sophistication of hacking tools and techniques, there is a crucial need for computer forensic analysis technique...
Jun-Hyung Park, Minsoo Kim, BongNam Noh, James B. ...
WCRE
2006
IEEE
14 years 3 months ago
Extracting Output Formats from Executables
We describe the design and implementation of FFE/x86 (File-Format Extractor for x86), an analysis tool that works on stripped executables (i.e., neither source code nor debugging ...
Junghee Lim, Thomas W. Reps, Ben Liblit
WSC
2000
13 years 11 months ago
Tire model for simulations of vehicle motion on high and low friction road surfaces
An on-road analytical tire model has been developed to predict tire forces and moments at the tire/road interface. The model is computationally efficient and it only requires a li...
James Lacombe