Sciweavers

2631 search results - page 279 / 527
» Software Development with Code Maps
Sort
View
ISSRE
2010
IEEE
15 years 1 months ago
Preventing Overflow Attacks by Memory Randomization
Buffer overflow is known to be a common memory vulnerability affecting software. It is exploited to gain various kinds of privilege escalation. C and C++ are very commonly used to ...
Vivek Iyer, Amit Kanitkar, Partha Dasgupta, Raghun...
WSE
2003
IEEE
15 years 8 months ago
Resolution of Static Clones in Dynamic Web Pages
Cloning is extremely likely to occur in web sites, much more so than in other software. While some clones exist for valid reasons, or are too small to eliminate, cloning percentag...
Nikita Synytskyy, James R. Cordy, Thomas R. Dean
114
Voted
MIDDLEWARE
2007
Springer
15 years 9 months ago
Life cycle support for sensor network applications
Developing applications for sensor networks is a challenging task. Most programming systems narrowly focus on programming issues while ignoring that programming represents only a ...
Urs Bischoff, Gerd Kortuem
118
Voted
CSMR
2006
IEEE
15 years 9 months ago
IntensiVE, a toolsuite for documenting and checking structural source-code regularities
As size and complexity of software systems increase, preserving the design and specification of their implementation structure gains importance in order to maintain the evolvabil...
Kim Mens, Andy Kellens
KBSE
2005
IEEE
15 years 9 months ago
Timna: a framework for automatically combining aspect mining analyses
To realize the benefits of Aspect Oriented Programming (AOP), developers must refactor active and legacy code bases into an AOP language. When refactoring, developers first need...
David Shepherd, Jeffrey Palm, Lori L. Pollock, Mar...