Sciweavers

848 search results - page 45 / 170
» Understanding Obfuscated Code
Sort
View
CASCON
1996
118views Education» more  CASCON 1996»
13 years 10 months ago
On predicting reliability of modules using code coverage
The estimation of reliability of modules using code coverage is motivated by a two-phase method for estimating the quality of software using static structure and predicted quality...
Saileshwar Krishnamurthy, Aditya P. Mathur
KBSE
2003
IEEE
14 years 2 months ago
Unspeculation
Modern architectures, such as the Intel Itanium, support speculation, a hardware mechanism that allows the early execution of expensive operations—possibly even before it is kno...
Noah Snavely, Saumya K. Debray, Gregory R. Andrews
JCP
2007
145views more  JCP 2007»
13 years 8 months ago
AnnAnn and AnnAnn.Net: Tools for Teaching Programming
— It is difficult for a student to learn about programs and to understand the rational that went into the development of the parts that led to the whole. Tools for explaining thi...
Clare J. Hooper, Les Carr, Hugh C. Davis, David E....
GECCO
2004
Springer
107views Optimization» more  GECCO 2004»
14 years 2 months ago
An Evolution Strategy Using a Continuous Version of the Gray-Code Neighbourhood Distribution
Abstract. We derive a continuous probability distribution which generates neighbours of a point in an interval in a similar way to the bitwise mutation of a Gray code binary string...
Jonathan E. Rowe, Dzena Hidovic
ICSM
2003
IEEE
14 years 2 months ago
Reverse Engineering of the Interaction Diagrams from C++ Code
In object oriented programming, the functionalities of a system result from the interactions (message exchanges) among the objects allocated by the system. While designing object ...
Paolo Tonella, Alessandra Potrich