Sciweavers

1379 search results - page 13 / 276
» codes 2009
Sort
View
IWPC
2009
IEEE
15 years 4 months ago
Automatically identifying changes that impact code-to-design traceability
An approach is presented that automatically determines if a given source code change impacts the design (i.e., UML class diagram) of the system. This allows code-to-design traceab...
Maen Hammad, Michael L. Collard, Jonathan I. Malet...
KBSE
2009
IEEE
15 years 4 months ago
Adding Examples into Java Documents
—Code examples play an important role to explain the usage of Application Programming Interfaces (APIs), but most API documents do not provide sufficient code examples. For exam...
Jinhan Kim, Sanghoon Lee, Seung-won Hwang, Sunghun...
SERA
2009
Springer
15 years 4 months ago
Inline Visualization of Concerns
—Code modularization provides benefits throughout the software life cycle; however, the presence of crosscutting concerns (CCCs) in software hinders its complete modularization....
Nalin Saigal, Jay Ligatti
72
Voted
DIMVA
2009
14 years 10 months ago
Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks
Remote code-injection attacks are one of the most frequently used attacking vectors in computer security. To detect and analyze injected code (often called shellcode), some researc...
Makoto Shimamura, Kenji Kono
CVPR
2009
IEEE
1626views Computer Vision» more  CVPR 2009»
16 years 4 months ago
Coded Exposure Deblurring: Optimized Codes for PSF Estimation and Invertibility
We consider the problem of single image object motion deblurring from a static camera. It is well known that deblurring of moving objects using a traditional camera is ill-posed, d...
Amit K. Agrawal, Yi Xu