Sciweavers

18 search results - page 3 / 4
» scam 2006
Sort
View
SCAM
2006
IEEE
14 years 3 months ago
Cross-Language Program Analysis and Refactoring
Many software systems are mixed-language systems today, i.e., they bind together components defined in different programming and specification languages. Analyses and refactorin...
Dennis Strein, Hans Kratz, Welf Löwe
SCAM
2006
IEEE
14 years 3 months ago
Normalizing Metamorphic Malware Using Term Rewriting
Metamorphic malware — including certain viruses and worms — rewrite their code during propagation. This paper presents a method for normalizing multiple variants of metamorphi...
Andrew Walenstein, Rachit Mathur, Mohamed R. Chouc...
SCAM
2006
IEEE
14 years 3 months ago
Constructing Accurate Application Call Graphs For Java To Model Library Callbacks
Call graphs are widely used to represent calling relationships among methods. However, there is not much interest in calling relationships among library methods in many software e...
Weilei Zhang, Barbara G. Ryder
SCAM
2006
IEEE
14 years 3 months ago
Factoring Differences for Iterative Change Management
An approach for factoring source-code differences is presented. A single large difference between two versions of a program is decomposed into factors (i.e., smaller changes). The...
Michael L. Collard, Huzefa H. Kagdi, Jonathan I. M...
SCAM
2006
IEEE
14 years 3 months ago
Evaluating C++ Design Pattern Miner Tools
Many articles and tools have been proposed over the years for mining design patterns from source code. These tools differ in several aspects, thus their fair comparison is hard. B...
Lajos Jeno Fülöp, Tamas Gyovai, Rudolf F...