Sciweavers

181 search results - page 21 / 37
» Reverse Engineering Method Stereotypes
Sort
View
RAID
2010
Springer
13 years 5 months ago
Inferring Protocol State Machine from Real-World Trace
Application-level protocol specifications are helpful for network security management, including intrusion detection, intrusion prevention and detecting malicious code. However, c...
Yipeng Wang, Zhibin Zhang, Li Guo
IUI
2006
ACM
14 years 1 months ago
Recovering semantic relations from web pages based on visual cues
Recovering semantic relations between different parts of web pages are of great importance for multi-platform web interface development, as they make it possible to re-distribute ...
Peifeng Xiang, Yuanchun Shi
KBSE
2010
IEEE
13 years 6 months ago
A visual interactive debugger based on symbolic execution
We present the concepts, usage, and prototypic implementation of a new kind of visual debugging tool based on symbolic execution of Java source code called visual symbolic state d...
Reiner Hähnle, Marcus Baum, Richard Bubel, Ma...
ANSS
2007
IEEE
14 years 1 months ago
Evaluating the Design of Biological Cells Using a Computer Workbench
For embedded systems as well as for biological cell systems, design is a feature that defines their identity. The assembly of different components in designs of both systems can ...
Tessa E. Pronk, Simon Polstra, Andy D. Pimentel, T...
CGF
2008
129views more  CGF 2008»
13 years 7 months ago
Code Flows: Visualizing Structural Evolution of Source Code
Understanding detailed changes done to source code is of great importance in software maintenance. We present Code Flows, a method to visualize the evolution of source code geared...
Alexandru Telea, David Auber