Sciweavers

848 search results - page 85 / 170
» Understanding Obfuscated Code
Sort
View
ICS
2005
Tsinghua U.
15 years 7 months ago
Improving the computational intensity of unstructured mesh applications
Although unstructured mesh algorithms are a popular means of solving problems across a broad range of disciplines—from texture mapping to computational fluid dynamics—they ar...
Brian S. White, Sally A. McKee, Bronis R. de Supin...
SEKE
2005
Springer
15 years 7 months ago
Using Feature-Oriented Analysis to Recover Legacy Software Design for Software Evolution
Most design recovery approaches start from analysing source code. Nonetheless, it is very difficult to get adequate design information only depending on source code. Additional av...
Shaoyun Li, Feng Chen, Zhihong Liang, Hongji Yang
TLDI
2003
ACM
134views Formal Methods» more  TLDI 2003»
15 years 7 months ago
Scrap your boilerplate: a practical design pattern for generic programming
We describe a design pattern for writing programs that traverse data structures built from rich mutually-recursive data types. Such programs often have a great deal of “boilerpl...
Ralf Lämmel, Simon L. Peyton Jones
WSE
2002
IEEE
15 years 7 months ago
Dynamic Model Extraction and Statistical Analysis of Web Applications
The World Wide Web, initially intended as a way to publish static hypertexts on the Internet, is moving toward complex applications. Static Web sites are being gradually replaced ...
Paolo Tonella, Filippo Ricca
CSMR
1999
IEEE
15 years 6 months ago
Impact of Function Pointers on the Call Graph
Maintenance activities are made more difficult when pointers are heavily used in source code: the programmer needs to build a mental model of memory locations and of the way they ...
Giuliano Antoniol, F. Calzolari, Paolo Tonella