Sciweavers

787 search results - page 35 / 158
» Source code analysis and manipulation
Sort
View
WCRE
2002
IEEE
15 years 2 months ago
Analysis of Virtual Method Invocation for Binary Translation
The University of Queensland Binary Translator (UQBT ) is a static binary translation framework that allows for the translation of binary, executable programs, from one architectu...
Jens Tröger, Cristina Cifuentes
63
Voted
ICASSP
2011
IEEE
14 years 1 months ago
A comparative analysis of biometric secret-key binding schemes based on QIM and Wyner-Ziv coding
Biometric secret-key binding inherently requires signal processing and error correction schemes due to noisy measurement readings. Two previously proposed strategies, Quantization...
Aniketh Talwai, Francis Minhthang Bui, Ashish Khis...
CSMR
2005
IEEE
15 years 3 months ago
Correlating Features and Code Using a Compact Two-Sided Trace Analysis Approach
Software developers are constantly required to modify and adapt application features in response to changing requirements. The problem is that just by reading the source code, it ...
Orla Greevy, Stéphane Ducasse
SAC
2010
ACM
15 years 4 months ago
Feature interaction networks
A quantitative approach for measuring and describing feature interactions in object-oriented software components based on source code inspection is presented. The methodical arsen...
Stefan Sobernig
INFSOF
2002
89views more  INFSOF 2002»
14 years 9 months ago
Source transformation in software engineering using the TXL transformation system
Many tasks in software engineering can be characterized as source to source transformations. Design recovery, software restructuring, forward engineering, language translation, pl...
James R. Cordy, Thomas R. Dean, Andrew J. Malton, ...