Sciweavers

787 search results - page 56 / 158
» Source code analysis and manipulation
Sort
View
CSMR
2010
IEEE
14 years 4 months ago
A Heuristic-Based Approach to Identify Concepts in Execution Traces
Abstract--Concept or feature identification, i.e., the identification of the source code fragments implementing a particular feature, is a crucial task during software understandin...
Fatemeh Asadi, Massimiliano Di Penta, Giuliano Ant...
WCRE
2003
IEEE
15 years 3 months ago
RegReg: a Lightweight Generator of Robust Parsers for Irregular Languages
In reverse engineering, parsing may be partially done to extract lightweight source models. Parsing code containing preprocessing directives, syntactical errors and embedded langu...
Mario Latendresse
ICMCS
2006
IEEE
219views Multimedia» more  ICMCS 2006»
15 years 3 months ago
Analysis of Multi-User Congestion Control for Video Streaming Over Wireless Networks
When multiple video sources are live-encoded and transmitted over a common wireless network, each stream needs to adapt its encoding parameters to wireless channel fluctuations, ...
Xiaoqing Zhu, Bernd Girod
WCRE
1999
IEEE
15 years 2 months ago
Partial Redesign of Java Software Systems Based on Clone Analysis
Code duplication, plausibly caused by copying source code and slightly modifying it, is often observed in large systems. Clone detection and documentation have been investigated b...
Magdalena Balazinska, Ettore Merlo, Michel Dagenai...
NDSS
2009
IEEE
15 years 4 months ago
K-Tracer: A System for Extracting Kernel Malware Behavior
Kernel rootkits can provide user level-malware programs with the additional capabilities of hiding their malicious activities by altering the legitimate kernel behavior of an oper...
Andrea Lanzi, Monirul I. Sharif, Wenke Lee