Sciweavers

848 search results - page 62 / 170
» Understanding Obfuscated Code
Sort
View
MSR
2006
ACM
14 years 2 months ago
Using evolutionary annotations from change logs to enhance program comprehension
Evolutionary annotations are descriptions of how source code evolves over time. Typical source comments, given their static nature, are usually inadequate for describing how a pro...
Daniel M. Germán, Peter C. Rigby, Margaret-...
WCRE
2005
IEEE
14 years 2 months ago
Enriching Reverse Engineering with Semantic Clustering
Understanding a software system by just analyzing the structure of the system reveals only half of the picture, since the structure tells us only how the code is working but not w...
Adrian Kuhn, Stéphane Ducasse, Tudor G&icir...
CORR
2010
Springer
135views Education» more  CORR 2010»
13 years 9 months ago
Automatic derivation of domain terms and concept location based on the analysis of the identifiers
Abstract. Developers express the meaning of the domain ideas in specifically selected identifiers and comments that form the target implemented code. Software maintenance requires ...
Peter Václavík, Jaroslav Porubä...
ISSTA
2009
ACM
14 years 3 months ago
Advanced code coverage analysis using substring holes
Code coverage is a common aid in the testing process. It is generally used for marking the source code segments that were executed and, more importantly, those that were not execu...
Yoram Adler, Eitan Farchi, Moshe Klausner, Dan Pel...
SECON
2008
IEEE
14 years 3 months ago
TCP Performance in Coded Wireless Mesh Networks
This paper investigates the benefit of network coding for TCP traffic in a wireless mesh network. We implement network coding in a real wireless mesh network and measure TCP thr...
Yong Huang, Majid Ghaderi, Donald F. Towsley, Weib...