Sciweavers

848 search results - page 71 / 170
» Understanding Obfuscated Code
Sort
View
ACSC
2006
IEEE
14 years 3 months ago
Identifying refactoring opportunities by identifying dependency cycles
The purpose of refactoring is to improve the quality of a software system by changing its internal design so that it is easier to understand or modify, or less prone to errors and...
Hayden Melton, Ewan D. Tempero
PASTE
2005
ACM
14 years 2 months ago
String analysis for x86 binaries
Information about string values at key points in a program can help program understanding, reverse engineering, and forensics. We present a static-analysis technique for recoverin...
Mihai Christodorescu, Nicholas Kidd, Wen-Han Goh
ICSM
2002
IEEE
14 years 1 months ago
Using Dynamic Information for the Iterative Recovery of Collaborations and Roles
Modeling object-oriented applications using collaborations and roles is now well accepted. Collaboration-based or role-based designs decompose an application into tasks performed ...
Tamar Richner, Stéphane Ducasse
CL
2006
Springer
13 years 9 months ago
Tailorable language for behavioral composition and configuration of software components
Many software systems suffer from missing support for behavioral (runtime) composition and configuration of software components. The concern "behavioral composition and confi...
Uwe Zdun
ENTCS
2007
86views more  ENTCS 2007»
13 years 9 months ago
Tool Support for Proof Engineering
Modern integrated development environments (IDEs) provide programmers with a variety of sophisticated tools for program visualization and manipulation. These tools assist the prog...
Anne Mulhern, Charles Fischer, Ben Liblit