Sciweavers

848 search results - page 155 / 170
» Understanding Obfuscated Code
Sort
View
WSE
2006
IEEE
14 years 1 months ago
Modeling Request Routing in Web Applications
For web applications, determining how requests from a web page are routed through server components can be time-consuming and error-prone due to the complex set of rules and mecha...
Minmin Han, Christine Hofmeister
AOSD
2006
ACM
14 years 1 months ago
Presenting crosscutting structure with active models
When modifying or debugging a software system, among other tasks, developers must often understand and manipulate source code that crosscuts the system’s structure. These tasks ...
Wesley Coelho, Gail C. Murphy
MM
2006
ACM
181views Multimedia» more  MM 2006»
14 years 1 months ago
Peer-to-peer multimedia applications
In both academia and industry, peer-to-peer (P2P) applications have attracted great attention. Peer-to-peer file sharing applications, such as Napster, Gnutella, Kazaa, BitTorrent...
Jin Li
MSR
2006
ACM
14 years 1 months ago
Using software birthmarks to identify similar classes and major functionalities
Software birthmarks are unique and native characteristics of every software component. Two components having similar birthmarks indicate that they are similar in functionality, st...
Takeshi Kakimoto, Akito Monden, Yasutaka Kamei, Ha...
SIGSOFT
2006
ACM
14 years 1 months ago
Bit level types for high level reasoning
Bitwise operations are commonly used in low-level systems code to access multiple data fields that have been packed into a single word. Program analysis tools that reason about s...
Ranjit Jhala, Rupak Majumdar