Sciweavers

848 search results - page 56 / 170
» Understanding Obfuscated Code
Sort
View
WCRE
2006
IEEE
14 years 2 months ago
FINT: Tool Support for Aspect Mining
Aspect mining requires adequate tool support to locate source code elements implementing crosscutting concerns (aka seeds), to explore and understand relations describing these el...
Marius Marin, Leon Moonen, Arie van Deursen
AUIC
2005
IEEE
14 years 2 months ago
Program Comprehension: Investigating the Effects of Naming Style and Documentation
In both commercial and academic environments, software development frameworks are an important tool in the construction of industrial strength software solutions. Despite the role...
Scott Blinman, Andy Cockburn
IWPC
2003
IEEE
14 years 2 months ago
Effective, Automatic Procedure Extraction
Legacy code can often be made more understandable and maintainable by extracting out selected sets of statements to form procedures and replacing the extracted code with procedure...
Raghavan Komondoor, Susan Horwitz
EUROPAR
2009
Springer
13 years 6 months ago
Argument Controlled Profiling
Profiling tools relate measurements to code context such as function names in order to guide code optimization. For a more detailed analysis, call path or phase-based profiling enh...
Tilman Küstner, Josef Weidendorfer, Tobias We...
SCP
2010
123views more  SCP 2010»
13 years 3 months ago
Slicing for architectural analysis
Current software development often relies on non trivial coordination logic for combining autonomous services, eventually running on different platforms. As a rule, however, such ...
Nuno F. Rodrigues, Luís Soares Barbosa