Sciweavers

3456 search results - page 177 / 692
» Byte Code Engineering
Sort
View
SIGSOFT
2009
ACM
16 years 3 months ago
ConcernMorph: metrics-based detection of crosscutting patterns
Crosscutting concerns can hinder maintainability of a design because they do not adhere to a system's underlying modular structure. Developers, therefore, may wish to refacto...
Eduardo Figueiredo, Jon Whittle, Alessandro F. Gar...
IWPC
2007
IEEE
15 years 9 months ago
Metrics for Measuring the Effectiveness of Decompilers and Obfuscators
Java developers often use decompilers to aid reverse engineering and obfuscators to prevent it. Decompilers translate low-level class files to Java source and can produce “good...
Nomair A. Naeem, Michael Batchelder, Laurie J. Hen...
AUIC
2006
IEEE
15 years 9 months ago
Visualisations of execution traces (VET): an interactive plugin-based visualisation tool
An execution trace contains a description of everything that happened during an execution of a program. Execution traces are useful, because they can help software engineers under...
Mike McGavin, Tim Wright, Stuart Marshall
KBSE
2003
IEEE
15 years 8 months ago
Unspeculation
Modern architectures, such as the Intel Itanium, support speculation, a hardware mechanism that allows the early execution of expensive operations—possibly even before it is kno...
Noah Snavely, Saumya K. Debray, Gregory R. Andrews
IWPC
2002
IEEE
15 years 8 months ago
Slicing Aspect-Oriented Software
Program slicing has many applications in software engineering activities including program comprehension, debugging, testing, maintenance, and model checking. In this paper, we pr...
Jianjun Zhao