Sciweavers

852 search results - page 55 / 171
» Understanding How the Requirements Are Implemented in Source...
Sort
View
ACSAC
2006
IEEE
15 years 10 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...
NIPS
2008
15 years 5 months ago
Hebbian Learning of Bayes Optimal Decisions
Uncertainty is omnipresent when we perceive or interact with our environment, and the Bayesian framework provides computational methods for dealing with it. Mathematical models fo...
Bernhard Nessler, Michael Pfeiffer, Wolfgang Maass
145
Voted
ASWEC
2009
IEEE
15 years 11 months ago
Change Propagation Analysis Using Domain Information
We propose a novel methodology for analysing change propagation in software using the domain-level behavioural model of a system. We hypothesize that change propagation analysis i...
Amir Aryani, Ian D. Peake, Margaret Hamilton, Hein...
INFSOF
2000
82views more  INFSOF 2000»
15 years 3 months ago
Connecting architecture reconstruction frameworks
A number of standalone tools are designed to help developers understand software systems. These tools operate at different levels of abstraction, from low level source code to sof...
Ivan T. Bowman, Michael W. Godfrey, Richard C. Hol...
IWPC
2008
IEEE
15 years 10 months ago
Exploiting Runtime Information in the IDE
Developers rely on the mechanisms provided by their IDE to browse and navigate a large software system. These mechanisms are usually based purely on a system’s static source cod...
David Röthlisberger, Orla Greevy, Oscar Niers...