Sciweavers

772 search results - page 47 / 155
» From Graph Transformation to Software Engineering and Back
Sort
View
KDD
2010
ACM
240views Data Mining» more  KDD 2010»
15 years 5 months ago
Diagnosing memory leaks using graph mining on heap dumps
Memory leaks are caused by software programs that prevent the reclamation of memory that is no longer in use. They can cause significant slowdowns, exhaustion of available storag...
Evan K. Maxwell, Godmar Back, Naren Ramakrishnan
DRM
2007
Springer
15 years 8 months ago
Slicing obfuscations: design, correctness, and evaluation
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
ISSE
2010
15 years 11 days ago
An integrated multi-view model evolution framework
A UML model of a software system can be represented by a sequence of model transformations, starting from an empty model. To effectively support the design of complex systems, tra...
Volker Stolz
TII
2010
155views Education» more  TII 2010»
14 years 8 months ago
Refactoring of Execution Control Charts in Basic Function Blocks of the IEC 61499 Standard
-This paper deals with refactoring of execution control charts of IEC 61499 basic function blocks as a means to improve the engineering support potential of the standard in develop...
Valeriy Vyatkin, Victor Dubinin
CODES
2005
IEEE
15 years 7 months ago
Shift buffering technique for automatic code synthesis from synchronous dataflow graphs
This paper proposes a new efficient buffer management technique called shift buffering for automatic code synthesis from synchronous dataflow graphs (SDF). Two previous buffer man...
Hyunok Oh, Nikil D. Dutt, Soonhoi Ha