Sciweavers

848 search results - page 130 / 170
» Understanding Obfuscated Code
Sort
View
KBSE
2002
IEEE
14 years 2 months ago
On CASE Tool Usage at Nokia
We present the results of a research work targeted to understanding CASE tools usage in Nokia. By means of a survey questionnaire, we collected data aimed to identify what feature...
Alessandro Maccari, Claudio Riva, Francesco Maccar...
ICSE
2010
IEEE-ACM
14 years 2 months ago
Developers ask reachability questions
A reachability question is a search across feasible paths through a program for target statements matching search criteria. In three separate studies, we found that reachability q...
Thomas D. LaToza, Brad A. Myers
ICSE
2009
IEEE-ACM
14 years 2 months ago
Visual exploration of large-scale evolving software
The comprehensive understanding of today’s software systems is a daunting activity, because of the sheer size and complexity that such systems exhibit. Moreover, software system...
Richard Wettel
ECOOP
2001
Springer
14 years 2 months ago
An Overview of AspectJ
AspectJ™ is a simple and practical aspect-oriented extension to Java™. With just a few new constructs, AspectJ provides support for modular implementation of a range of crosscu...
Gregor Kiczales, Erik Hilsdale, Jim Hugunin, Mik K...
MA
2001
Springer
175views Communications» more  MA 2001»
14 years 2 months ago
Evaluating the Security of Three Java-Based Mobile Agent Systems
Abstract. The goal of mobile agent systems is to provide a distributed computing infrastructure supporting applications whose components can move between different execution enviro...
Sebastian Fischmeister, Giovanni Vigna, Richard A....