Sciweavers

3456 search results - page 204 / 692
» Byte Code Engineering
Sort
View
125
Voted
ICSE
2008
IEEE-ACM
16 years 4 months ago
Granularity in software product lines
Building software product lines (SPLs) with features is a challenging task. Many SPL implementations support features with coarse granularity ? e.g., the ability to add and wrap e...
Christian Kästner, Martin Kuhlemann, Sven Ape...
104
Voted
ECLIPSE
2005
ACM
15 years 5 months ago
NaCIN: an Eclipse plug-in for program navigation-based concern inference
In this paper we describe NaCIN, an Eclipse plug-in that records a developer’s code navigation activity and produces sets of elements potentially implementing different concerns...
Imran Majid, Martin P. Robillard
KBSE
2010
IEEE
15 years 1 months ago
A visual interactive debugger based on symbolic execution
We present the concepts, usage, and prototypic implementation of a new kind of visual debugging tool based on symbolic execution of Java source code called visual symbolic state d...
Reiner Hähnle, Marcus Baum, Richard Bubel, Ma...
SAC
2010
ACM
15 years 3 months ago
Graph-based verification of static program constraints
Software artifacts usually have static program constraints and these constraints should be satisfied in each reuse. In addition to this, the developers are also required to satisf...
Selim Ciraci, Pim van den Broek, Mehmet Aksit
127
Voted
ACSC
2006
IEEE
15 years 9 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson