Sciweavers

848 search results - page 118 / 170
» Understanding Obfuscated Code
Sort
View
ICSE
2009
IEEE-ACM
14 years 10 months ago
Tesseract: Interactive visual exploration of socio-technical relationships in software development
Software developers have long known that project success requires a robust understanding of both technical and social linkages. However, research has largely considered these inde...
Anita Sarma, Larry Maccherone, Patrick Wagstrom, J...
ICSE
2009
IEEE-ACM
14 years 10 months ago
A toolset for automated failure analysis
Classic fault localization techniques can automatically provide information about the suspicious code blocks that are likely responsible for observed failures. This information is...
Fabrizio Pastore, Leonardo Mariani, Mauro Pezz&egr...
SIGSOFT
2007
ACM
14 years 10 months ago
An empirical study on the evolution of design patterns
Design patterns are solutions to recurring design problems, conceived to increase benefits in terms of reuse, code quality and, above all, maintainability and resilience to change...
Lerina Aversano, Gerardo Canfora, Luigi Cerulo, Co...
WWW
2009
ACM
14 years 10 months ago
Modeling semantics and structure of discussion threads
The abundant knowledge in web communities has motivated the research interests in discussion threads. The dynamic nature of discussion threads poses interesting and challenging pr...
Chen Lin, Jiang-Ming Yang, Rui Cai, Xin-Jing Wang,...
POPL
2009
ACM
14 years 10 months ago
Semi-sparse flow-sensitive pointer analysis
Pointer analysis is a prerequisite for many program analyses, and the effectiveness of these analyses depends on the precision of the pointer information they receive. Two major a...
Ben Hardekopf, Calvin Lin