Sciweavers

848 search results - page 102 / 170
» Understanding Obfuscated Code
Sort
View
PSYCHNOLOGY
2007
83views more  PSYCHNOLOGY 2007»
15 years 1 months ago
Mobile Fantasies on Film: Gathering Metaphoric Evidence of Mobile Symbiosis and the Mobile Imaginary
Mobile communication studies are often limited in their ability to capture the entire domain of a mobile phone call. These limitations often require that researchers separately st...
Kathleen M. Cumiskey
SIGPLAN
2008
15 years 1 months ago
AspectC2C: a symmetric aspect extension to the C language
By separating crosscutting concerns into modules, aspectoriented programming (AOP) can greatly improve the maintainability, understandability and reusability of software. However,...
Danfeng Zhang, Yao Guo, Xiangqun Chen
SCP
2010
108views more  SCP 2010»
15 years 18 days ago
Combining dynamic and static slicing for analysing assembler
One of the most challenging tasks a programmer can face is attempting to analyse and understand a legacy assembler system. Many features of assembler make analysis difficult, and ...
Martin P. Ward, Hussein Zedan
SOFTVIS
2010
ACM
15 years 18 days ago
Visual comparison of software architectures
Reverse engineering methods produce different descriptions of software architectures. In this work we analyze and define the task of exploring and comparing these descriptions. ...
Fabian Beck, Stephan Diehl
FECS
2010
131views Education» more  FECS 2010»
15 years 6 days ago
The Mythical Creature Approach - A Simulation Alternative to Building Computer Architectures
In this paper, we present a method to help teach computer architecture (or computer organization) by developing an in class system where the students, themselves, compile high-leve...
Peter Jamieson, Darrel Davis, Brooke Spangler