Sciweavers

848 search results - page 49 / 170
» Understanding Obfuscated Code
Sort
View
SEKE
2009
Springer
14 years 3 months ago
Detecting Defects with an Interactive Code Review Tool Based on Visualisation and Machine Learning
Code review is often suggested as a means of improving code quality. Since humans are poor at repetitive tasks, some form of tool support is valuable. To that end we developed a p...
Stefan Axelsson, Dejan Baca, Robert Feldt, Darius ...
IRI
2005
IEEE
14 years 2 months ago
Reusing legacy COBOL code with UML collaboration diagrams via a Wide Spectrum Language
Many legacy systems were developed in COBOL, which still play an important role in business. It is an unavoidable issue for organisations to maintain or replace these COBOL system...
Jianjun Pu, Zhuopeng Zhang, Yang Xu, Hongji Yang
CONCURRENCY
2007
95views more  CONCURRENCY 2007»
13 years 9 months ago
Automated and accurate cache behavior analysis for codes with irregular access patterns
Abstract. The memory hierarchy plays an essential role in the performance of current computers, thus good analysis tools that help predict and understand its behavior are required....
Diego Andrade, Manuel Arenaz, Basilio B. Fraguela,...
TMC
2010
109views more  TMC 2010»
13 years 7 months ago
On the Performance Bounds of Practical Wireless Network Coding
—Network coding is an attracting technology that has been shown to be able to improve the throughput of wireless networks. However, there still lacks fundamental understanding on...
Jilin Le, John C. S. Lui, Dah-Ming Chiu
ICSE
1995
IEEE-ACM
14 years 13 days ago
Reverse Engineering of Legacy Code Exposed
— Reverse engineering of large legacy software systems generally cannot meet its objectives because it cannot be cost-effective. There are two main reasons for this. First, it is...
Bruce W. Weide, Wayne D. Heym, Joseph E. Hollingsw...