Executable source code and non-executable source code: analysis and relationships

被引:0
|
作者
Robles, G [1 ]
Gonzalez-Barahona, JM [1 ]
机构
[1] Univ Rey Juan Carlos, Grp Sistemas & Comun, Madrid 28933, Spain
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The concept of source code, understood as the source components used to obtain a binary, ready to execute version of a program, comprises currently more than source code written in a programming language. Specialty when we move apart from systems-programming and enter the realm of end-user applications, we find source files with documentation, interface specifications, internationalization and localization modules, multimedia files, etc. All of them are source code in the sense that the developer works directly with them, and the application is built automatically using them as input. This paper discusses the relationship between 'classical' source code (usually written in a programming language) and these other files by analyzing a publicly-available software versioning repository. Aspects that have been studied include the nature of the software repository, the different mixtures of source code found in several software projects stored in it, the specialization of developers to the different tasks, etc.
引用
收藏
页码:149 / 157
页数:9
相关论文
共 50 条
  • [41] Improved Algorithm for Identification of Switch Tables in Executable Code
    Gedich, Andrei
    Lazdin, Artur
    PROCEEDINGS OF THE 17TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION FRUCT, 2015, : 44 - 49
  • [42] An Executable Code Authorization Model for Secure Operating System
    Chen Zemao
    Wu Xiaoping
    Tang Weimin
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 292 - +
  • [43] SOFTWARE METHODS FOR VIRTUAL-STORAGE OF EXECUTABLE CODE
    BROWN, PJ
    COMPUTER JOURNAL, 1979, 22 (01): : 50 - 52
  • [44] Extracting Executable Transformations from Distilled Code Changes
    Stevens, Reinout
    De Roover, Coen
    2017 IEEE 24TH INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION, AND REENGINEERING (SANER), 2017, : 171 - 181
  • [45] AN APPROACH TO EXECUTABLE SPECIFICATIONS, BASED ON FORMAL SOURCE TO SOURCE CONVERSION
    ZHANG, ZE
    SIGPLAN NOTICES, 1995, 30 (12): : 51 - 58
  • [46] An Analysis Tool that Detects The Code Caves in Specified Sizes for Portable Executable Files
    Ugurlu, Guney
    Acici, Koray
    2022 INTERNATIONAL CONFERENCE ON THEORETICAL AND APPLIED COMPUTER SCIENCE AND ENGINEERING (ICTASCE), 2022, : 38 - 41
  • [47] Method of Security Against Computer Attacks Based on an Analysis of Executable Machine Code
    Aranov, V. Yu.
    Zaborovsky, V. S.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2015, 49 (08) : 705 - 708
  • [48] Automatic Generation of Executable Code from Software Architecture Models
    Stavrou, Aristos
    Papadopoulos, George A.
    INFORMATION SYSTEMS DEVELOPMENT: CHALLENGES IN PRACTICE, THEORY AND EDUCATION, VOLS 1AND 2, 2009, : 1047 - 1058
  • [49] Translation of Z specifications to executable code: Application to the database domain
    Khalafinejad, Saeed
    Mirian-Hosseinabadi, Seyed-Hassan
    INFORMATION AND SOFTWARE TECHNOLOGY, 2013, 55 (06) : 1017 - 1044
  • [50] Translating Security Policy to Executable code for Sandboxing Linux Kernel
    Mohanty, Hrushikesha
    VenkataSwamy, M.
    Ramaswamy, Srini
    Shyamasundar, R. K.
    2009 THIRD UKSIM EUROPEAN SYMPOSIUM ON COMPUTER MODELING AND SIMULATION (EMS 2009), 2009, : 124 - +