[图书][B] Refactoring object-oriented frameworks
WF Opdyke - 1992 - search.proquest.com
ProQuest Dissertations Page 1 INFORMATION TO USERS This manuscript has been
reproduced from the microfilm master. UMI films the text directly from the original or copy …
reproduced from the microfilm master. UMI films the text directly from the original or copy …
The concept assignment problem in program understanding
TJ Biggerstaff, BG Mitbander… - … Working Conference on …, 1993 - ieeexplore.ieee.org
The problem of discovering individual human oriented concepts and assigning them to their
implementation-oriented counterparts for a given program is the concept assignment …
implementation-oriented counterparts for a given program is the concept assignment …
Noninterference through secure multi-execution
D Devriese, F Piessens - 2010 IEEE Symposium on Security …, 2010 - ieeexplore.ieee.org
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a
higher security level than their own. Various researchers have demonstrated how this …
higher security level than their own. Various researchers have demonstrated how this …
Reverse engineering: a roadmap
Teach reverse engineering, program understanding, and software analysis in computer
science, computer engineering, and software engineering curricula. Investigate …
science, computer engineering, and software engineering curricula. Investigate …
Pattern matching for clone and concept detection
KA Kontogiannis, R DeMori, E Merlo, M Galler… - Automated Software …, 1996 - Springer
A legacy system is an operational, large-scale software system that is maintained beyond its
first generation of programmers. It typically represents a massive economic investment and …
first generation of programmers. It typically represents a massive economic investment and …
Extracting business rules from source code
HM Sneed, K Erdos - WPC'96. 4th Workshop on Program …, 1996 - ieeexplore.ieee.org
The paper reviews the state of the art on application knowledge acquisition from existing
software systems and defines the role of business rules. It then goes on to present a method …
software systems and defines the role of business rules. It then goes on to present a method …
[PDF][PDF] Static analysis of students' Java programs
N Truong, P Roe, P Bancroft - Proceedings of the Sixth …, 2004 - researchgate.net
A recent industry survey (Townhidnejad and Hilburn, 2002) has reported that more than fifty
percent of a software project's budget is spent on activities related to improving software …
percent of a software project's budget is spent on activities related to improving software …
Understanding software systems using reverse engineering technology
Software engineering research has focused primarily on software construction, neglecting
software maintenance and evolution. Observed is a shift in research from synthesis to …
software maintenance and evolution. Observed is a shift in research from synthesis to …
Software forensics: Can we track code to its authors?
EH Spafford, SA Weeber - Computers & Security, 1993 - Elsevier
Viruses, worms, trojan horses and crackers all exist and threaten the security of our
computer systems. Often, we are aware of an intrusion only after it has occured. On some …
computer systems. Often, we are aware of an intrusion only after it has occured. On some …
A data mining approach for detecting higher-level clones in software
HA Basit, S Jarzabek - IEEE Transactions on Software …, 2009 - ieeexplore.ieee.org
Code clones are similar program structures recurring in variant forms in software system (s).
Several techniques have been proposed to detect similar code fragments in software, so …
Several techniques have been proposed to detect similar code fragments in software, so …