Sciweavers

848 search results - page 131 / 170
» Understanding Obfuscated Code
Sort
View
HPCA
2000
IEEE
14 years 2 months ago
Register Organization for Media Processing
Processor architectures with tens to hundreds of arithmetic units are emerging to handle media processing applications. These applications, such as image coding, image synthesis, ...
Scott Rixner, William J. Dally, Brucek Khailany, P...
TOOLS
2000
IEEE
14 years 2 months ago
Extending Business Objects with Business Rules
It is common to imbed business rules within the code of distributed object systems. When business practices and/or policies change, as they often do, it is difficult if not imposs...
Isabelle Rouvellou, Lou Degenaro, Kevin Rasmus, Da...
ICSM
1999
IEEE
14 years 1 months ago
Bunch: A Clustering Tool for the Recovery and Maintenance of Software System Structures
Software systems are typically modified in order to extend or change their functionality, improve their performance, port them to different platforms, and so on. For developers, i...
Spiros Mancoridis, Brian S. Mitchell, Yih-Farn Che...
ERSHOV
1999
Springer
14 years 1 months ago
The Essence of Program Transformation by Partial Evaluation and Driving
Abstract. An abstract framework is developed to describe program transformation by specializing a given program to a restricted set of inputs. Particular cases include partial eval...
Neil D. Jones
ICSE
1999
IEEE-ACM
14 years 1 months ago
Pattern-Based Reverse-Engineering of Design Components
Many reverse-engineering tools have been developed to detract representations from source code. Yet, most of these tools completely ignore recovery of the all-important rationale ...
Rudolf K. Keller, Reinhard Schauer, Sébasti...