Sciweavers

787 search results - page 45 / 158
» Source code analysis and manipulation
Sort
View
CAV
2010
Springer
153views Hardware» more  CAV 2010»
15 years 1 months ago
There's Plenty of Room at the Bottom: Analyzing and Verifying Machine Code
This paper discusses the obstacles that stand in the way of doing a good job of machine-code analysis. Compared with analysis of source code, the challenge is to drop all assumptio...
Thomas W. Reps, Junghee Lim, Aditya V. Thakur, Gog...
PPPJ
2003
ACM
15 years 3 months ago
An examination of the run-time performance of GUI creation frameworks
The graphical user interface (GUI) is an important component of many software systems. Past surveys indicate that the development of a GUI is a significant undertaking and that t...
Christopher J. Howell, Gregory M. Kapfhammer, Robe...
VIROLOGY
2010
179views more  VIROLOGY 2010»
14 years 8 months ago
Automatic binary deobfuscation
Abstract. This paper gives an overview of our research in the automation of the process of software protection analysis. We will focus more particularly on the problem of obfuscati...
Yoann Guillot, Alexandre Gazet
ICSE
2008
IEEE-ACM
15 years 10 months ago
Clonetracker: tool support for code clone management
Code clones are generally considered to be an obstacle to software maintenance. Research has provided evidence that it may not always be practical, feasible, or cost-effective to ...
Ekwa Duala-Ekoko, Martin P. Robillard
SEKE
2009
Springer
15 years 4 months ago
Detecting Defects with an Interactive Code Review Tool Based on Visualisation and Machine Learning
Code review is often suggested as a means of improving code quality. Since humans are poor at repetitive tasks, some form of tool support is valuable. To that end we developed a p...
Stefan Axelsson, Dejan Baca, Robert Feldt, Darius ...