Sciweavers

3456 search results - page 117 / 692
» Byte Code Engineering
Sort
View
109
Voted
HOTDEP
2008
107views Hardware» more  HOTDEP 2008»
15 years 4 months ago
Reverse-Engineering Drivers for Safety and Portability
Device drivers today lack two important properties: guaranteed safety and cross-platform portability. We present an approach to incrementally achieving these properties in drivers...
Vitaly Chipounov, George Candea
96
Voted
SIGSOFT
2009
ACM
16 years 3 months ago
Learning from examples to improve code completion systems
The suggestions made by current IDE's code completion features are based exclusively on static type system of the programming language. As a result, often proposals are made ...
Marcel Bruch, Martin Monperrus, Mira Mezini
119
Voted
IWPC
2009
IEEE
15 years 9 months ago
The effectiveness of source code obfuscation: An experimental assessment
Source code obfuscation is a protection mechanism widely used to limit the possibility of malicious reverse engineering or attack activities on a software system. Although several...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...
IWPSE
2007
IEEE
15 years 9 months ago
Structural analysis and visualization of C++ code evolution using syntax trees
We present a method to detect and visualize evolution patterns in C++ source code. Our method consists of three steps. First, we extract an annotated syntax tree (AST) from each v...
Fanny Chevalier, David Auber, Alexandru Telea
ICSE
2010
IEEE-ACM
15 years 1 months ago
Fourth International Workshop on Software Clones (IWSC)
Software clones are identical or similar pieces of code. They are often the result of copy–and–paste activities as ad-hoc code reuse by programmers. Software clones research i...
Katsuro Inoue, Stanislaw Jarzabek, James R. Cordy,...