Sciweavers

828 search results - page 8 / 166
» A New Model of Program Dependences for Reverse Engineering
Sort
View
WCRE
2005
IEEE
14 years 1 months ago
Deobfuscation: Reverse Engineering Obfuscated Code
In recent years, code obfuscation has attracted attention as a low cost approach to improving software security by making it difficult for attackers to understand the inner worki...
Sharath K. Udupa, Saumya K. Debray, Matias Madou
MSR
2006
ACM
14 years 1 months ago
Are refactorings less error-prone than other changes?
Refactorings are program transformations which should preserve the program behavior. Consequently, we expect that during phases when there are mostly refactorings in the change hi...
Peter Weißgerber, Stephan Diehl
ICCAD
1996
IEEE
133views Hardware» more  ICCAD 1996»
13 years 11 months ago
Basic concepts for an HDL reverse engineering tool-set
Designer's productivity has become the key-factor of the development of electronic systems. An increasing application of design data reuse is widely recognized as a promising...
Gunther Lehmann, Bernhard Wunder, Klaus D. Mü...
ESAW
2008
Springer
13 years 9 months ago
A Reverse Engineering Form for Multi Agent Systems
The IODA methodology allows automated construction of models from an ontology, consisting of generic interactions that we can assign to families of agents. Thanks to the measuremen...
François Gaillard, Yoann Kubera, Philippe M...
IAJIT
2010
162views more  IAJIT 2010»
13 years 6 months ago
Deriving Conceptual Schema from Domain Ontology: A Web Application Reverse Engineering Approach
: The heterogeneous and dynamic nature of components making up a web application, the lack of effective programming mechanisms for implementing basic software engineering principle...
Sidi Mohamed Benslimane, Mimoun Malki, Djelloul Bo...