Sciweavers

848 search results - page 89 / 170
» Understanding Obfuscated Code
Sort
View
99
Voted
SIGSOFT
2007
ACM
16 years 2 months ago
Recovering and using use-case-diagram-to-source-code traceability links
Use case diagrams (UCDs) are widely used to describe requirements and desired functionality of software products. However, UCDs are loosely linked to source code, and maintaining ...
Mark Grechanik, Kathryn S. McKinley, Dewayne E. Pe...
137
Voted
OSDI
2000
ACM
15 years 3 months ago
Knit: Component Composition for Systems Software
Knit is a new component definition and linking language for systems code. Knit helps make C code more understandable and reusable by third parties, helps eliminate much of the per...
Alastair Reid, Matthew Flatt, Leigh Stoller, Jay L...
130
Voted
POPL
2012
ACM
13 years 9 months ago
Towards a program logic for JavaScript
JavaScript has become the most widely used language for clientside web programming. The dynamic nature of JavaScript makes understanding its code notoriously difficult, leading t...
Philippa Gardner, Sergio Maffeis, Gareth David Smi...
132
Voted
OSDI
2008
ACM
16 years 2 months ago
Mining Console Logs for Large-Scale System Problem Detection
The console logs generated by an application contain messages that the application developers believed would be useful in debugging or monitoring the application. Despite the ubiq...
Wei Xu, Ling Huang, Armando Fox, David A. Patterso...
116
Voted
ICSM
2009
IEEE
15 years 8 months ago
Maintenance and agile development: Challenges, opportunities and future directions
Software entropy is a phenomenon where repeated changes gradually degrade the structure of the system, making it hard to understand and maintain. This phenomenon imposes challenge...
Geir Kjetil Hanssen, Aiko Fallas Yamashita, Reidar...