Sciweavers

2957 search results - page 71 / 592
» Code analysis and CS-XML
Sort
View
SPLC
2010
14 years 11 months ago
Feature-to-Code Mapping in Two Large Product Lines
Abstract. Large product lines have complex build systems, which obscure mapping of features to code. We extract this mapping out of the build systems of two operating systems kerne...
Thorsten Berger, Steven She, Rafael Lotufo, Krzysz...
SCAM
2008
IEEE
15 years 4 months ago
The Evolution and Decay of Statically Detected Source Code Vulnerabilities
The presence of vulnerable statements in the source code is a crucial problem for maintainers: properly monitoring and, if necessary, removing them is highly desirable to ensure h...
Massimiliano Di Penta, Luigi Cerulo, Lerina Aversa...
ACSD
2001
IEEE
74views Hardware» more  ACSD 2001»
15 years 1 months ago
From Code to Models
One of the corner stones of formal methods is the notion traction enables analysis. By the construction of act model we can trade implementation detail for analytical power. The i...
Gerard J. Holzmann
ICASSP
2009
IEEE
15 years 4 months ago
High-rate distributed multi-source cooperation using complex field coding
A multisource cooperative protocol is developed capable of achieving diversity order up to the number of cooperating users at a high throughput. In this design each source jointly...
Alfonso Cano Pleite, Jesús Gómez-Vil...
ACSC
2006
IEEE
15 years 3 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson