Sciweavers

1368 search results - page 104 / 274
» Understanding Software Systems Using Reverse Engineering Tec...
Sort
View
MSR
2006
ACM
15 years 8 months ago
The evolution radar: visualizing integrated logical coupling information
In software evolution research logical coupling has extensively been used to recover the hidden dependencies between source code artifacts. They would otherwise go lost because of...
Marco D'Ambros, Michele Lanza, Mircea Lungu
ICECCS
1998
IEEE
110views Hardware» more  ICECCS 1998»
15 years 6 months ago
Risk Assessment and Integrity in System Design
All systems, regardless of how carefully they have been constructed, suffer failures. This paper focuses on developing a formal understanding of failure with respect to system imp...
Raymond Berg, Victor L. Winter
ACSC
2006
IEEE
15 years 8 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson
107
Voted
EUROMICRO
1999
IEEE
15 years 6 months ago
The X-MatchLITE FPGA-Based Data Compressor
This paper introduces a hardware amenable algorithm for lossless data compression and a highly integrable architecture which enables Gbit/s compression using contemporary ASIC tec...
Jose Luis Nunez, Claudia Feregrino, Simon Jones, S...
SEKE
1995
Springer
15 years 5 months ago
Visual Scenarios for Validation of Requirements Specification
The development of a large information system is generally regarded as one of the most complex activities undertaken by organizations and it is dependent on the communication and u...
V. Lalioti, Babis Theodoulidis