Sciweavers

848 search results - page 75 / 170
» Understanding Obfuscated Code
Sort
View
ASE
2002
141views more  ASE 2002»
13 years 11 months ago
On the Automatic Recovery of Style-Specific Architectural Relations in Software Systems
The cost of maintaining a software system over a long period of time far exceeds its initial development cost. Much of the maintenance cost is attributed to the time required by ne...
Martin Traverso, Spiros Mancoridis
ECOOP
2012
Springer
12 years 1 months ago
Enhancing JavaScript with Transactions
Abstract. Transcript is a system that enhances JavaScript with support for transactions. Hosting Web applications can use transactions to demarcate regions that contain untrusted g...
Mohan Dhawan, Chung-chieh Shan, Vinod Ganapathy
CHI
2006
ACM
14 years 11 months ago
Social visualization in software development
Most software development tools focus on supporting the primary technical work ? writing code, managing requirements, filing bugs, etc. Yet with large teams, managing the social a...
Jason B. Ellis, Catalina Danis, Christine Halverso...
SEKE
2009
Springer
14 years 5 months ago
Extending AOP to Support Broad Runtime Monitoring Needs
Abstract—Runtime monitoring, where some part of a program’s behavior and/or data is observed during execution, is a very useful technique that software developers to use for un...
Amjad Nusayr, Jonathan Cook
AGILEDC
2007
IEEE
14 years 5 months ago
The Agile Maturity Map A Goal Oriented Approach to Agile Improvement
Fulfilling the potential of Agile development depends on people truly wanting to change how they work. Transitioning to new methods of development is particularly daunting in a la...
Jay Packlick