Sciweavers

1368 search results - page 148 / 274
» Understanding Software Systems Using Reverse Engineering Tec...
Sort
View
179
Voted
ECEASST
2010
14 years 12 months ago
GUI Inspection from Source Code Analysis
Abstract: Graphical user interfaces (GUIs) are critical components of todays software. Given their increased relevance, correctness and usability of GUIs are becoming essential. Th...
João Carlos Silva 0002, José Creissa...
107
Voted
SIGSOFT
2004
ACM
16 years 3 months ago
Implementing protocols via declarative event patterns
This paper introduces declarative event patterns (DEPs) as a means to implement protocols while improving their traceability, comprehensibility, and maintainability. DEPs are desc...
Robert J. Walker, Kevin Viggers
123
Voted
ISPAN
2000
IEEE
15 years 7 months ago
User Level Communication on Alpha Linux Systems
Recent advances in commodity network interface technology enable scientists and engineers to build clusters of workstations or PCs to execute parallel applications. However, raw-h...
Jie Chen, William A. Watson III
122
Voted
CASES
2004
ACM
15 years 8 months ago
Hardware assisted control flow obfuscation for embedded processors
+ With more applications being deployed on embedded platforms, software protection becomes increasingly important. This problem is crucial on embedded systems like financial transa...
Xiaotong Zhuang, Tao Zhang, Hsien-Hsin S. Lee, San...
108
Voted
GTTSE
2007
Springer
15 years 8 months ago
Automated Merging of Feature Models Using Graph Transformations
Abstract. Feature Models (FMs) are a key artifact for variability and commonality management in Software Product Lines (SPLs). In this context, the merging of FMs is being recogniz...
Sergio Segura, David Benavides, Antonio Ruiz Cort&...