[图书][B] Refactoring object-oriented frameworks

WF Opdyke - 1992 - search.proquest.com
ProQuest Dissertations Page 1 INFORMATION TO USERS This manuscript has been
reproduced from the microfilm master. UMI films the text directly from the original or copy …

The concept assignment problem in program understanding

TJ Biggerstaff, BG Mitbander… - … Working Conference on …, 1993 - ieeexplore.ieee.org
The problem of discovering individual human oriented concepts and assigning them to their
implementation-oriented counterparts for a given program is the concept assignment …

Noninterference through secure multi-execution

D Devriese, F Piessens - 2010 IEEE Symposium on Security …, 2010 - ieeexplore.ieee.org
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a
higher security level than their own. Various researchers have demonstrated how this …

Reverse engineering: a roadmap

HA Müller, JH Jahnke, DB Smith, MA Storey… - Proceedings of the …, 2000 - dl.acm.org
Teach reverse engineering, program understanding, and software analysis in computer
science, computer engineering, and software engineering curricula. Investigate …

Pattern matching for clone and concept detection

KA Kontogiannis, R DeMori, E Merlo, M Galler… - Automated Software …, 1996 - Springer
A legacy system is an operational, large-scale software system that is maintained beyond its
first generation of programmers. It typically represents a massive economic investment and …

Extracting business rules from source code

HM Sneed, K Erdos - WPC'96. 4th Workshop on Program …, 1996 - ieeexplore.ieee.org
The paper reviews the state of the art on application knowledge acquisition from existing
software systems and defines the role of business rules. It then goes on to present a method …

[PDF][PDF] Static analysis of students' Java programs

N Truong, P Roe, P Bancroft - Proceedings of the Sixth …, 2004 - researchgate.net
A recent industry survey (Townhidnejad and Hilburn, 2002) has reported that more than fifty
percent of a software project's budget is spent on activities related to improving software …

Understanding software systems using reverse engineering technology

HA Müller, K Wong, SR Tilley - Object-Oriented Technology for …, 1995 - World Scientific
Software engineering research has focused primarily on software construction, neglecting
software maintenance and evolution. Observed is a shift in research from synthesis to …

Software forensics: Can we track code to its authors?

EH Spafford, SA Weeber - Computers & Security, 1993 - Elsevier
Viruses, worms, trojan horses and crackers all exist and threaten the security of our
computer systems. Often, we are aware of an intrusion only after it has occured. On some …

A data mining approach for detecting higher-level clones in software

HA Basit, S Jarzabek - IEEE Transactions on Software …, 2009 - ieeexplore.ieee.org
Code clones are similar program structures recurring in variant forms in software system (s).
Several techniques have been proposed to detect similar code fragments in software, so …