Sciweavers

848 search results - page 132 / 170
» Understanding Obfuscated Code
Sort
View
ICSE
1998
IEEE-ACM
14 years 1 months ago
Extracting Concepts from File Names: A New File Clustering Criterion
Decomposing complex software systems into conceptually independent subsystems is a significant software engineering activity which received considerable research attention. Most o...
Nicolas Anquetil, Timothy Lethbridge
IMPERIAL
1993
14 years 1 months ago
Deriving Category Theory from Type Theory
This work expounds the notion that (structured) categories are syntax free presentations of type theories, and shows some of the ideas involved in deriving categorical semantics f...
Roy L. Crole
IWMM
2000
Springer
113views Hardware» more  IWMM 2000»
14 years 1 months ago
On the Effectiveness of GC in Java
We study the effectiveness of garbage collection (GC) algorithms by measuring the time difference between the actual collection time of an object and the potential earliest collec...
Ran Shaham, Elliot K. Kolodner, Shmuel Sagiv
ICLP
1997
Springer
14 years 1 months ago
A Practical Approach to Structure Reuse of Arrays in Single Assignment Languages
Array updates in single assignment languages generally require some copying of the array, and thus tend to be more expensive than in imperative languages. As a result, programs in...
Andreas Kågedal, Saumya K. Debray
DSN
2009
IEEE
14 years 27 days ago
Precise request tracing and performance debugging for multi-tier services of black boxes
As more and more multi-tier services are developed from commercial components or heterogeneous middleware without the source code available, both developers and administrators nee...
Zhihong Zhang, Jianfeng Zhan, Yong Li, Lei Wang, D...