Sciweavers

246 search results - page 27 / 50
» How Do Program Understanding Tools Affect How Programmers Un...
Sort
View
ERSHOV
2003
Springer
15 years 7 months ago
On the Possibility of Provably Secure Obfuscating Programs
By obfuscation we mean any efficient semantic-preserving transformation of computer programs aimed at bringing a program into such a form, which impedes the understanding of its al...
Nikolay P. Varnovsky, Vladimir A. Zakharov
COMPSAC
2002
IEEE
15 years 7 months ago
From System Comprehension to Program Comprehension
Program and system comprehension are vital parts of the software maintenance process. We discuss the need for both perspectives and describe two methods that may be integrated to ...
Christos Tjortjis, Nicolas Gold, Paul J. Layzell, ...
115
Voted
SOFTVIS
2003
ACM
15 years 7 months ago
Visualization of Program-Execution Data for Deployed Software
Software products are often released with missing functionality, errors, or incompatibilities that may result in failures in the field, inferior performances, or, more generally,...
Alessandro Orso, James A. Jones, Mary Jean Harrold
FLOPS
2006
Springer
15 years 6 months ago
Contracts as Pairs of Projections
Abstract. Assertion-based contracts provide a powerful mechanism for stating invariants at module boundaries and for enforcing them uniformly. In 2002, Findler and Felleisen showed...
Robert Bruce Findler, Matthias Blume
113
Voted
TEI
2010
ACM
199views Hardware» more  TEI 2010»
15 years 9 months ago
Revealing the invisible: visualizing the location and event flow of distributed physical devices
Distributed physical user interfaces comprise networked sensors, actuators and other devices attached to a variety of computers in different locations. Developing such systems is ...
Nicolai Marquardt, Tom Gross, M. Sheelagh T. Carpe...