Sciweavers

848 search results - page 94 / 170
» Understanding Obfuscated Code
Sort
View
118
Voted
IWPC
2009
IEEE
15 years 8 months ago
Resumption strategies for interrupted programming tasks
Interruptions are a daily reality for professional programmers. Unfortunately, the strategies programmers use to recover lost knowledge and resume work have not yet been well stud...
Chris Parnin, Spencer Rugaber
139
Voted
CIBSE
2009
ACM
15 years 8 months ago
A Domain Specific Language to Generate Web Applications
Nowadays building a web application is still a complex process that requires a big effort to get several tasks done. This article presents a domain specific language aimed to simpl...
Juan José Cadavid, Juan Bernardo Quintero, ...
KBSE
2008
IEEE
15 years 8 months ago
Predicting Effectiveness of Automatic Testing Tools
—Automatic white-box test generation is a challenging problem. Many existing tools rely on complex code analyses and heuristics. As a result, structural features of an input prog...
Brett Daniel, Marat Boshernitsan
112
Voted
WCRE
2008
IEEE
15 years 8 months ago
Analyzing the Actual Execution of a Large Software-Intensive System for Determining Dependencies
In this paper, we present a dynamic analysis approach to increase the understandability of a large softwareintensive system, more particularly to enable the identification of depe...
Trosky Boris Callo Arias, Paris Avgeriou, Pierre A...
IPCCC
2007
IEEE
15 years 8 months ago
Application Insight Through Performance Modeling
Tuning the performance of applications requires understanding the interactions between code and target architecture. This paper describes a performance modeling approach that not ...
Gabriel Marin, John M. Mellor-Crummey