Sciweavers

848 search results - page 33 / 170
» Understanding Obfuscated Code
Sort
View
COMPSAC
2005
IEEE
14 years 2 months ago
Searching Design Patterns in Source Code
Maintenance is a time consuming activity within software development and it requires a good understanding of the system in question. It is hard or even impossible to understand po...
Detlef Streitferdt, Christian Heller, Ilka Philipp...
MSR
2009
ACM
14 years 3 months ago
Code siblings: Technical and legal implications of copying code between applications
Source code cloning does not happen within a single system only. It can also occur between one system and another. We use the term code sibling to refer to a code clone that evolv...
Daniel M. Germán, Massimiliano Di Penta, Ya...
ICSOFT
2007
13 years 10 months ago
Towards a New Code-Based Software Development Concept Enabling Code Patterns
Modern software development is driven by many critical forces. Among them are fast deployment requirements, a code base adaptable to new technologies, easy-to-maintain code, and lo...
Klaus Meffert, Ilka Philippow
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
14 years 22 days ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...
PPPJ
2003
ACM
14 years 2 months ago
A noughts and crosses Java applet to teach programming to primary school children
We report on a continuing study into teaching programming to pre-teens school-children, with some as young as seven years old. As part of the study we aim to test childrens’ alg...
J. Paul Gibson