Sciweavers

848 search results - page 105 / 170
» Understanding Obfuscated Code
Sort
View
130
Voted
IWPSE
2007
IEEE
15 years 8 months ago
Modification analysis support at the requirements level
Modification analysis is part of most maintenance processes and includes among other activities, early prediction of potential change impacts, feasibility studies, cost estimation...
Maryam Shiri, Jameleddine Hassine, Juergen Rilling
111
Voted
QEST
2007
IEEE
15 years 8 months ago
A Productivity Centered Tools Framework for Application Performance Tuning
Our productivity centered performance tuning framework for HPC applications comprises of three main components: (1) a versatile source code, performance metrics, and performance d...
Hui-Fang Wen, Simone Sbaraglia, Seetharami Seelam,...
133
Voted
TACAS
2007
Springer
108views Algorithms» more  TACAS 2007»
15 years 8 months ago
State of the Union: Type Inference Via Craig Interpolation
The ad-hoc use of unions to encode disjoint sum types in C programs and the inability of C’s type system to check the safe use of these unions is a long standing source of subtle...
Ranjit Jhala, Rupak Majumdar, Ru-Gang Xu
110
Voted
CODES
2006
IEEE
15 years 8 months ago
Automatic run-time extraction of communication graphs from multithreaded applications
Embedded system synthesis, multiprocessor synthesis, and thread assignment policy design all require detailed knowledge of the runtime communication patterns among different threa...
Ai-Hsin Liu, Robert P. Dick
119
Voted
IWPC
2006
IEEE
15 years 8 months ago
Building Usage Contexts During Program Comprehension
Software developers often work on multiple simultaneous projects. Even when only a single project is underway, everyday distractions interrupt the development effort. Consequently...
Chris Parnin, Carsten Görg