Sciweavers

618 search results - page 35 / 124
» A Practical Program Transformation System for Reverse Engine...
Sort
View
PASTE
2010
ACM
15 years 5 months ago
Null dereference analysis in practice
Many analysis techniques have been proposed to determine when a potentially null value may be dereferenced. But we have observed in practice that not every potential null derefere...
Nathaniel Ayewah, William Pugh
106
Voted
SMALLTALK
2007
Springer
15 years 9 months ago
Object flow analysis: taking an object-centric view on dynamic analysis
To extract abstract views of the behavior of an object-oriented system for reverse engineering, a body of research exists that analyzes a system’s runtime execution. Those approa...
Adrian Lienhard, Stéphane Ducasse, Tudor G&...
DAWAK
2009
Springer
15 years 1 months ago
Towards a Modernization Process for Secure Data Warehouses
Data Warehouses (DW) manage crucial enterprise information used for the decision making process which has to be protected from unauthorized accesses. However, security constraints ...
Carlos Blanco, Ricardo Pérez-Castillo, Arnu...
ICSE
1997
IEEE-ACM
15 years 7 months ago
Visualizing Interactions in Program Executions
Implementing, validating, modifying, or reengineering an object-oriented system requires an understanding of the object and class interactions which occur as a program executes. T...
Dean F. Jerding, John T. Stasko, Thomas Ball
ICSM
2005
IEEE
15 years 8 months ago
Annotated Inclusion Constraints for Precise Flow Analysis
Program flow analysis has many applications in software tools for program understanding, restructuring, verification, testing and reverse engineering. There are two important re...
Ana Milanova, Barbara G. Ryder