WCRE
15 years 2 months ago
2005 IEEE
The use of design patterns in a software system can provide strong indications about the rationale behind the system’s design. As a result, automating the detection of design pa...
WCRE
15 years 2 months ago
2005 IEEE
Software decay is a phenomenon that plagues aging software systems. While in recent years, there has been significant progress in the area of automatic detection of “code smells...
WCRE
15 years 2 months ago
2005 IEEE
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
WCRE
15 years 2 months ago
2005 IEEE
In recent years, code obfuscation has attracted attention as a low cost approach to improving software security by making it difficult for attackers to understand the inner worki...
WCRE
15 years 2 months ago
2005 IEEE |