Sciweavers

677 search results - page 11 / 136
» Domain-Retargetable Reverse Engineering
Sort
View
WISTP
2007
Springer
14 years 2 months ago
Reverse Engineering Java Card Applets Using Power Analysis
Abstract. Power analysis on smart cards is widely used to obtain information about implemented cryptographic algorithms. We propose similar methodology for Java Card applets revers...
Dennis Vermoen, Marc F. Witteman, Georgi Gaydadjie...
WCRE
2008
IEEE
14 years 2 months ago
SQL2XMI: Reverse Engineering of UML-ER Diagrams from Relational Database Schemas
Data modeling is an essential part of the software development process, and together with application modeling forms the core of the model-driven approach to software engineering....
Manar H. Alalfi, James R. Cordy, Thomas R. Dean
ADAEUROPE
2006
Springer
14 years 2 months ago
Bauhaus - A Tool Suite for Program Analysis and Reverse Engineering
The maintenance and evolution of critical software with high requirements for reliability is an extremely demanding, time consuming and expensive task. Errors introduced by ad-hoc ...
Aoun Raza, Gunther Vogel, Erhard Plödereder
APPROX
2004
Springer
116views Algorithms» more  APPROX 2004»
14 years 1 months ago
Randomized Approximation Algorithms for Set Multicover Problems with Applications to Reverse Engineering of Protein and Gene Net
In this paper we investigate the computational complexity of a combinatorial problem that arises in the reverse engineering of protein and gene networks. Our contributions are as ...
Piotr Berman, Bhaskar DasGupta, Eduardo D. Sontag
PASTE
2005
ACM
14 years 2 months ago
Static control-flow analysis for reverse engineering of UML sequence diagrams
UML sequence diagrams are commonly used to represent the interactions among collaborating objects. Reverse-engineered sequence diagrams are constructed from existing code, and hav...
Atanas Rountev, Olga Volgin, Miriam Reddoch