Sciweavers

2957 search results - page 494 / 592
» Code analysis and CS-XML
Sort
View
WCRE
2009
IEEE
15 years 11 months ago
NTrace: Function Boundary Tracing for Windows on IA-32
—For a long time, dynamic tracing has been an enabling technique for reverse engineering tools. Tracing can not only be used to record the control flow of a particular component...
Johannes Passing, Alexander Schmidt, Martin von L&...
NDSS
2009
IEEE
15 years 11 months ago
K-Tracer: A System for Extracting Kernel Malware Behavior
Kernel rootkits can provide user level-malware programs with the additional capabilities of hiding their malicious activities by altering the legitimate kernel behavior of an oper...
Andrea Lanzi, Monirul I. Sharif, Wenke Lee
ICDCSW
2009
IEEE
15 years 11 months ago
Performance Tradeoffs Among Percolation-Based Broadcast Protocols in Wireless Sensor Networks
Broadcast of information in wireless sensor networks is an important operation, e.g., for code updates, queries, membership information, etc. In this paper, we analyze and experim...
Vijay Raman, Indranil Gupta
ICSM
2009
IEEE
15 years 11 months ago
Modeling class cohesion as mixtures of latent topics
The paper proposes a new measure for the cohesion of classes in Object-Oriented software systems. It is based on the analysis of latent topics embedded in comments and identifiers...
Yixun Liu, Denys Poshyvanyk, Rudolf Ferenc, Tibor ...
ICSM
2009
IEEE
15 years 11 months ago
Maintenance and agile development: Challenges, opportunities and future directions
Software entropy is a phenomenon where repeated changes gradually degrade the structure of the system, making it hard to understand and maintain. This phenomenon imposes challenge...
Geir Kjetil Hanssen, Aiko Fallas Yamashita, Reidar...