Sciweavers

848 search results - page 104 / 170
» Understanding Obfuscated Code
Sort
View
118
Voted
ICSE
2005
IEEE-ACM
16 years 2 months ago
Object naming analysis for reverse-engineered sequence diagrams
UML sequence diagrams are commonly used to represent object interactions in software systems. This work considers the problem of extracting UML sequence diagrams from existing cod...
Atanas Rountev, Beth Harkness Connell
122
Voted
TEI
2010
ACM
133views Hardware» more  TEI 2010»
15 years 9 months ago
Move it!: puppetry for creativity
This project studied the influence of kinesthetic intelligences on creativity in young children. To understand this relationship preschoolers were observed in their daycare setti...
Jasmine M. Williams
107
Voted
ICSM
2008
IEEE
15 years 8 months ago
Supporting software evolution analysis with historical dependencies and defect information
More than 90% of the cost of software is due to maintenance and evolution. Understanding the evolution of large software systems is a complex problem, which requires the use of va...
Marco D'Ambros
114
Voted
CODES
2007
IEEE
15 years 8 months ago
Embedded software development on top of transaction-level models
Early embedded SW development with transaction-level models has been broadly promoted to improve SoC design productivity. But the proposed APIs only provide low-level read/write o...
Wolfgang Klingauf, Robert Günzel, Christian S...
99
Voted
IWPC
2007
IEEE
15 years 8 months ago
Tracking Objects to Detect Feature Dependencies
The domain-specific ontology of a software system includes a set of features and their relationships. While the problem of locating features in object-oriented programs has been ...
Adrian Lienhard, Orla Greevy, Oscar Nierstrasz