Sciweavers

1368 search results - page 70 / 274
» Understanding Software Systems Using Reverse Engineering Tec...
Sort
View
VEE
2012
ACM
238views Virtualization» more  VEE 2012»
12 years 5 months ago
Replacement attacks against VM-protected applications
Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software p...
Sudeep Ghosh, Jason Hiser, Jack W. Davidson
KBSE
2002
IEEE
14 years 3 months ago
On CASE Tool Usage at Nokia
We present the results of a research work targeted to understanding CASE tools usage in Nokia. By means of a survey questionnaire, we collected data aimed to identify what feature...
Alessandro Maccari, Claudio Riva, Francesco Maccar...
ICFEM
1998
Springer
14 years 1 months ago
Formal Specification of CORBA Services Using Object-Z
Open component architectures, such as CORBA, allow software systems to be composed of independent components. The behavior of components is described with a mixture of an interfac...
Detlef Kreuz
SIGSOFT
2005
ACM
14 years 11 months ago
Facilitating software evolution research with kenyon
Software evolution research inherently has several resourceintensive logistical constraints. Archived project artifacts, such as those found in source code repositories and bug tr...
Jennifer Bevan, E. James Whitehead Jr., Sunghun Ki...
IWPSE
2005
IEEE
14 years 3 months ago
How Developers Drive Software Evolution
As systems evolve their structure change in ways not expected upfront. As time goes by, the knowledge of the developers becomes more and more critical for the process of understan...
Tudor Gîrba, Adrian Kuhn, Mauricio Seeberger...