Sciweavers

848 search results - page 68 / 170
» Understanding Obfuscated Code
Sort
View
FOAL
2009
ACM
14 years 3 months ago
Unweaving the impact of aspect changes in AspectJ
Aspect-oriented programming (AOP) fosters the coding of tangled concerns in separated units that are then woven together in the executable system. Unfortunately, the oblivious nat...
Luca Cavallaro, Mattia Monga
CSMR
2007
IEEE
14 years 3 months ago
Example-Driven Reconstruction of Software Models
As software systems evolve, they become more complex and harder to understand and maintain. Certain reverse engineering techniques attempt to reconstruct software models from sour...
Oscar Nierstrasz, Markus Kobel, Tudor Gîrba,...
WCRE
2003
IEEE
14 years 2 months ago
Extracting an Explicitly Data-Parallel Representation of Image-Processing Programs
Our research goal is to retarget image processing programs written in sequential languages (e.g., C) to architectures with data-parallel processing capabilities. Image processing ...
Lewis B. Baumstark Jr., Murat Guler, Linda M. Will...
CASCON
2004
129views Education» more  CASCON 2004»
13 years 10 months ago
Practical language-independent detection of near-miss clones
Previous research shows that most software systems contain significant amounts of duplicated, or cloned, code. Some clones are exact duplicates of each other, while others differ ...
James R. Cordy, Thomas R. Dean, Nikita Synytskyy
WCRE
2010
IEEE
13 years 7 months ago
Studying the Impact of Clones on Software Defects
—There are numerous studies that examine whether or not cloned code is harmful to software systems. Yet, few of them study which characteristics of cloned code in particular lead...
Gehan M. K. Selim, Liliane Barbour, Weiyi Shang, B...