Sciweavers

478 search results - page 17 / 96
» Working Effectively with Legacy Code
Sort
View
DSN
2008
IEEE
14 years 1 months ago
AGIS: Towards automatic generation of infection signatures
An important yet largely uncharted problem in malware defense is how to automate generation of infection signatures for detecting compromised systems, i.e., signatures that charac...
Zhuowei Li, XiaoFeng Wang, Zhenkai Liang, Michael ...
IWPC
2006
IEEE
14 years 1 months ago
Towards a Client Driven Characterization of Class Hierarchies
Object-oriented legacy systems are hard to maintain because they are hard to understand. One of the main understanding problems is revealed by the so-called ”yo-yo effect” tha...
Petru Florin Mihancea
STEP
2003
IEEE
14 years 20 days ago
Incorporating Quality Requirements in Software Migration Process
The reengineering of legacy software systems to modern Object Oriented platforms has received significant attention over the past few years. However, most often the reengineering ...
Ying Zou
ECOOP
2008
Springer
13 years 9 months ago
A Uniform Transactional Execution Environment for Java
Abstract. Transactional memory (TM) has recently emerged as an effective tool for extracting fine-grain parallelism from declarative critical sections. In order to make STM systems...
Lukasz Ziarek, Adam Welc, Ali-Reza Adl-Tabatabai, ...
SAMOS
2010
Springer
13 years 5 months ago
CLI-based compilation flows for the C language
Abstract--Embedded systems contain a wide variety of processors. Economical and technological factors favor systems made of a combination of diverse but programmable processors. So...
Erven Rohou, Andrea C. Ornstein, Marco Cornero