Sciweavers

848 search results - page 87 / 170
» Understanding Obfuscated Code
Sort
View
150
Voted
PUC
2008
87views more  PUC 2008»
15 years 1 months ago
Multimodal support to group dynamics
The complexity of group dynamics occurring in small group interactions often hinders the performance of teams. The availability of rich multimodal information about what is going o...
Fabio Pianesi, Massimo Zancanaro, Elena Not, Chiar...
141
Voted
CSMR
2010
IEEE
14 years 9 months ago
A Heuristic-Based Approach to Identify Concepts in Execution Traces
Abstract--Concept or feature identification, i.e., the identification of the source code fragments implementing a particular feature, is a crucial task during software understandin...
Fatemeh Asadi, Massimiliano Di Penta, Giuliano Ant...
SIGSOFT
2007
ACM
16 years 2 months ago
Efficient token based clone detection with flexible tokenization
Code clones are similar code fragments that occur at multiple locations in a software system. Detection of code clones provides useful information for maintenance, reengineering, ...
Hamid Abdul Basit, Stan Jarzabek
145
Voted
WCRE
1995
IEEE
15 years 5 months ago
Pattern Matching for Design Concept Localization
A legacy system is an operational, large-scale software system that is maintained beyond its first generation of programmers. It typically represents a massive economic investmen...
Kostas Kontogiannis, Renato de Mori, Morris Bernst...
WCET
2010
15 years 2 hour ago
Hybrid measurement-based WCET analysis at the source level using object-level traces
Hybrid measurement-based approaches to worst-case execution time (WCET) analysis combine measured execution times of small program segments using static analysis of the larger sof...
Adam Betts, Nicholas Merriam, Guillem Bernat