Sciweavers

171 search results - page 6 / 35
» Integrating legacy systems with MDE
Sort
View
ICSM
2000
IEEE
13 years 12 months ago
Recovering Class Diagrams from Data-Intensive Legacy Systems
Several reverse engineering methods for recovering objects from legacy systems have been proposed in the literature, but most of them neglect to identify the relationships among t...
Giuseppe A. Di Lucca, Anna Rita Fasolino, Ugo de C...
DIMVA
2010
13 years 9 months ago
Conqueror: Tamper-Proof Code Execution on Legacy Systems
We present Conqueror, a software-based attestation scheme for tamper-proof code execution on untrusted legacy systems. Beside providing load-time attestation of a piece of code, Co...
Lorenzo Martignoni, Roberto Paleari, Danilo Brusch...
LWA
2008
13 years 9 months ago
Making Legacy LMS adaptable using Policy and Policy templates
In this paper, we discuss how users and designers of existing learning management systems (LMSs) can make use of policies to enhance adaptivity and adaptability. Many widespread L...
Arne Wolf Koesling, Eelco Herder, Juri Luca De Coi...
INFSOF
2008
121views more  INFSOF 2008»
13 years 7 months ago
A test driven approach for aspectualizing legacy software using mock systems
Aspect-based refactoring, called aspectualization, involves moving program code that implements cross-cutting concerns into aspects. Such refactoring can improve the maintainabili...
Michael Mortensen, Sudipto Ghosh, James M. Bieman
ENTCS
2008
87views more  ENTCS 2008»
13 years 7 months ago
Remote Attestation on Legacy Operating Systems With Trusted Platform Modules
A lot of progress has been made to secure network communication, e.g., through the use of cryptographic algorithms. However, this offers only a partial solution as long as the com...
Dries Schellekens, Brecht Wyseur, Bart Preneel