Sciweavers

684 search results - page 65 / 137
» Reverse Engineering CAPTCHAs
Sort
View
ICSE
2010
IEEE-ACM
14 years 11 months ago
LM: a miner for scenario-based specifications
We present LM, a tool for mining scenario-based specifications in the form of Live Sequence Charts, a visual language that extends sequence diagrams with modalities. LM comes with...
Tuan-Anh Doan, David Lo, Shahar Maoz, Siau-Cheng K...
IASSE
2004
14 years 11 months ago
Design Pattern Recognition
The role of design patterns in forward engineering is well known, also if it's not easy to use them, since large experience is needed. Different approaches and tools have bee...
Francesca Arcelli Fontana, Claudia Raibulet, Franc...
ISSTA
2012
ACM
13 years 9 days ago
A human study of patch maintainability
Identifying and fixing defects is a crucial and expensive part of the software lifecycle. Measuring the quality of bug-fixing patches is a difficult task that affects both func...
Zachary P. Fry, Bryan Landau, Westley Weimer
WCRE
2009
IEEE
15 years 4 months ago
Automatic Package Coupling and Cycle Minimization
Abstract—Object-oriented (OO) software is usually organized into subsystems using the concepts of package or module. Such modular structure helps applications to evolve when faci...
Hani Abdeen, Stéphane Ducasse, Houari A. Sa...
DRM
2005
Springer
15 years 3 months ago
Control flow based obfuscation
A software obfuscator is a program O to transform a source program P for protection against malicious reverse engineering. O should be correct (O(P) has same functionality with P)...
Jun Ge, Soma Chaudhuri, Akhilesh Tyagi