Sciweavers

828 search results - page 9 / 166
» A New Model of Program Dependences for Reverse Engineering
Sort
View
COODBSE
1994
85views more  COODBSE 1994»
13 years 9 months ago
Understanding Software Systems Using Reverse Engineering Technology
Software engineering research has focused primarily on software construction, neglecting software maintenance and evolution. Observed is a shift in research from synthesis to anal...
Hausi A. Müller, Kenny Wong, Scott R. Tilley
WCRE
1999
IEEE
13 years 12 months ago
Chava: Reverse Engineering and Tracking of Java Applets
Java applets have been used increasingly on web sites to perform client-side processing and provide dynamic content. While many web site analysis tools are available, their focus ...
Jeffrey L. Korn, Yih-Farn Chen, Eleftherios Koutso...
CCS
2008
ACM
13 years 9 months ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...
JCB
2006
91views more  JCB 2006»
13 years 7 months ago
Reverse Engineering Discrete Dynamical Systems from Data Sets with Random Input Vectors
Recently a new algorithm for reverse engineering of biochemical networks was developed by Laubenbacher and Stigler. It is based on methods from computational algebra and finds mos...
Winfried Just
CCR
2004
79views more  CCR 2004»
13 years 7 months ago
Reverse engineering the Internet
To provide insight into Internet operation and performance, recent efforts have measured various aspects of the Internet, developing and improving measurement tools in the process....
Neil T. Spring, David Wetherall, Thomas E. Anderso...