Sciweavers

495 search results - page 77 / 99
» The Subword Reversing Method
Sort
View
ACSC
2006
IEEE
14 years 2 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson
WCRE
2006
IEEE
14 years 2 months ago
On Computing the Canonical Features of Software Systems
Software applications typically have many features that vary in their similarity. We define a measurement of similarity between pairs of features based on their underlying implem...
Jay Kothari, Trip Denton, Spiros Mancoridis, Ali S...
WCRE
2006
IEEE
14 years 2 months ago
"Cloning Considered Harmful" Considered Harmful
Current literature on the topic of duplicated (cloned) code in software systems often considers duplication harmful to the system quality and the reasons commonly cited for duplic...
Cory Kapser, Michael W. Godfrey
IUI
2006
ACM
14 years 2 months ago
Recovering semantic relations from web pages based on visual cues
Recovering semantic relations between different parts of web pages are of great importance for multi-platform web interface development, as they make it possible to re-distribute ...
Peifeng Xiang, Yuanchun Shi
ICSM
2005
IEEE
14 years 2 months ago
Object-Oriented Reengineering: Patterns and Techniques
Surprising as it may seem, many of the early adopters of the object-oriented paradigm already face a number of problems typically encountered in large-scale legacy systems. Softwa...
Serge Demeyer, Stéphane Ducasse, Oscar Nier...