Sciweavers

677 search results - page 123 / 136
» Reverse Engineering is Reverse Forward Engineering
Sort
View
TVCG
2012
184views Hardware» more  TVCG 2012»
13 years 2 months ago
Spherical DCB-Spline Surfaces with Hierarchical and Adaptive Knot Insertion
—This paper develops a novel surface fitting scheme for automatically reconstructing a genus-0 object into a continuous parametric spline surface. A key contribution for making ...
Juan Cao, Xin Li, Zhonggui Chen, Hong Qin
ICSE
2008
IEEE-ACM
16 years 14 days ago
Scalable detection of semantic clones
Several techniques have been developed for identifying similar code fragments in programs. These similar fragments, referred to as code clones, can be used to identify redundant c...
Mark Gabel, Lingxiao Jiang, Zhendong Su
ICSE
2008
IEEE-ACM
16 years 14 days ago
Symbolic mining of temporal specifications
Program specifications are important in many phases of the software development process, but they are often omitted or incomplete. An important class of specifications takes the f...
Mark Gabel, Zhendong Su
104
Voted
SIGSOFT
2008
ACM
16 years 12 days ago
Javert: fully automatic mining of general temporal properties from dynamic traces
Program specifications are important for many tasks during software design, development, and maintenance. Among these, temporal specifications are particularly useful. They expres...
Mark Gabel, Zhendong Su
114
Voted
PEPM
2010
ACM
15 years 8 months ago
Context-sensitive analysis of obfuscated x86 executables
A method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations is presented. Such binaries may use operators to directly manipul...
Arun Lakhotia, Davidson R. Boccardo, Anshuman Sing...