Sciweavers

848 search results - page 39 / 170
» Understanding Obfuscated Code
Sort
View
CC
2004
Springer
14 years 2 months ago
Developing a Foundation for Code Optimization
Although optimization technology has been successful over the past 40 years, recent trends are emerging that demand we reconsider the paradigm that we are using for code optimizati...
Mary Lou Soffa
ENTCS
2002
98views more  ENTCS 2002»
13 years 8 months ago
Verified Code Generation for Embedded Systems
Digital signal processors provide specialized SIMD (single instruction multiple data) operations designed to dramatically increase performance in embedded systems. While these ope...
Sabine Glesner, Rubino Geiß, Boris Boesler
SIGSOFT
1994
ACM
14 years 28 days ago
LCLint: A Tool for Using Specifications to Check Code
This paper describes LCLint, an efficient and flexible tool that accepts as input programs (written in ANSI C) and various levels of formal specification. Using this information, ...
David Evans, John V. Guttag, James J. Horning, Yan...
ICSM
2003
IEEE
14 years 2 months ago
Using Intentional Source-Code Views to Aid Software Maintenance
The conceptual structure of existing software systems is often implicit or non-existing in the source code. We prolightweight abstraction of intentional source-code views as a mea...
Kim Mens, Bernard Poll, Sebastián Gonz&aacu...
CSMR
2010
IEEE
13 years 3 months ago
Recognizing Words from Source Code Identifiers Using Speech Recognition Techniques
The existing software engineering literature has empirically shown that a proper choice of identifiers influences software understandability and maintainability. Researchers have n...
Nioosha Madani, Latifa Guerrouj, Massimiliano Di P...