Sciweavers

3456 search results - page 177 / 692
» Byte Code Engineering
Sort
View
SIGSOFT
2009
ACM
16 years 5 months ago
ConcernMorph: metrics-based detection of crosscutting patterns
Crosscutting concerns can hinder maintainability of a design because they do not adhere to a system's underlying modular structure. Developers, therefore, may wish to refacto...
Eduardo Figueiredo, Jon Whittle, Alessandro F. Gar...
IWPC
2007
IEEE
15 years 11 months ago
Metrics for Measuring the Effectiveness of Decompilers and Obfuscators
Java developers often use decompilers to aid reverse engineering and obfuscators to prevent it. Decompilers translate low-level class files to Java source and can produce “good...
Nomair A. Naeem, Michael Batchelder, Laurie J. Hen...
AUIC
2006
IEEE
15 years 10 months ago
Visualisations of execution traces (VET): an interactive plugin-based visualisation tool
An execution trace contains a description of everything that happened during an execution of a program. Execution traces are useful, because they can help software engineers under...
Mike McGavin, Tim Wright, Stuart Marshall
KBSE
2003
IEEE
15 years 10 months ago
Unspeculation
Modern architectures, such as the Intel Itanium, support speculation, a hardware mechanism that allows the early execution of expensive operations—possibly even before it is kno...
Noah Snavely, Saumya K. Debray, Gregory R. Andrews
IWPC
2002
IEEE
15 years 9 months ago
Slicing Aspect-Oriented Software
Program slicing has many applications in software engineering activities including program comprehension, debugging, testing, maintenance, and model checking. In this paper, we pr...
Jianjun Zhao