Sciweavers

848 search results - page 101 / 170
» Understanding Obfuscated Code
Sort
View
IJMMS
2006
119views more  IJMMS 2006»
15 years 2 months ago
Pair programming productivity: Novice-novice vs. expert-expert
Agile Software Development methodologies have grown in popularity both among academic researchers and industrial practitioners. Among the various methodologies or practices propos...
Kim Man Lui, Keith C. C. Chan
ISI
2006
Springer
15 years 2 months ago
Content Analysis of Jihadi Extremist Groups' Videos
This paper presents an exploratory study of jihadi extremist groups' videos using content analysis and a multimedia coding tool to explore the types of videos, groups' mo...
Arab Salem, Edna Reid, Hsinchun Chen
ENTCS
2007
81views more  ENTCS 2007»
15 years 2 months ago
Self-assembling Trees
RCCS is a variant of Milner’s CCS where processes are allowed a controlled form of backtracking. It turns out that the RCCS reinterpretation of a CCS process is equivalent, in t...
Vincent Danos, Jean Krivine, Fabien Tarissan
129
Voted
JUCS
2007
80views more  JUCS 2007»
15 years 2 months ago
Higher-Order Lazy Functional Slicing
: Program slicing is a well known family of techniques intended to identify and isolate code fragments which depend on, or are depended upon, specific program entities. This is pa...
Nuno F. Rodrigues, Luís Soares Barbosa
INFSOF
2000
82views more  INFSOF 2000»
15 years 2 months ago
Connecting architecture reconstruction frameworks
A number of standalone tools are designed to help developers understand software systems. These tools operate at different levels of abstraction, from low level source code to sof...
Ivan T. Bowman, Michael W. Godfrey, Richard C. Hol...