Sciweavers

677 search results - page 40 / 136
» Domain-Retargetable Reverse Engineering
Sort
View
CCS
2008
ACM
13 years 10 months ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...
KBSE
1998
IEEE
14 years 23 days ago
An Automated Approach for Supporting Software Reuse via Reverse Engineering
Formal approaches to software reuse rely heavily upon specificationmatchingcriterion, where asearch query using formal specifications is used to search a library of components ind...
Gerald C. Gannod, Yonghao Chen, Betty H. C. Cheng
WCRE
1999
IEEE
14 years 24 days ago
A Framework for Classifying and Comparing Software Reverse Engineering and Design Recovery Techniques
Several techniques have been suggested for supporting reverse engineering and design recovery activities. While many of these techniques have been cataloged in various collections...
Gerald C. Gannod, Betty H. C. Cheng
INFORMATICALT
2007
164views more  INFORMATICALT 2007»
13 years 8 months ago
Extracting Personalised Ontology from Data-Intensive Web Application: an HTML Forms-Based Reverse Engineering Approach
The advance of the Web has significantly and rapidly changed the way of information organization, sharing and distribution. The next generation of the web, the semantic web, seeks...
Sidi Mohamed Benslimane, Mimoun Malki, Mustapha Ka...
WSR
2008
13 years 10 months ago
Graph Technology in Reverse Engineering: The TGraph Approach
: TGraphs are directed graphs with typed, attributed, and ordered nodes and edges. These properties leverage the use of graphs as models for all kinds of artifacts in the context o...
Jürgen Ebert, Volker Riediger, Andreas Winter