Sciweavers

181 search results - page 7 / 37
» Reverse Engineering Method Stereotypes
Sort
View
ER
1995
Springer
109views Database» more  ER 1995»
14 years 4 days ago
Reverse Engineering of Relational Database Applications
Abstract. This paper presents techniques for reverse engineering of relational database applications. The target of such an effort is the definition of a fully equipped object-orie...
Mark W. W. Vermeer, Peter M. G. Apers
JCB
2006
91views more  JCB 2006»
13 years 8 months ago
Reverse Engineering Discrete Dynamical Systems from Data Sets with Random Input Vectors
Recently a new algorithm for reverse engineering of biochemical networks was developed by Laubenbacher and Stigler. It is based on methods from computational algebra and finds mos...
Winfried Just
ICSM
2003
IEEE
14 years 1 months ago
Reverse Engineering of the Interaction Diagrams from C++ Code
In object oriented programming, the functionalities of a system result from the interactions (message exchanges) among the objects allocated by the system. While designing object ...
Paolo Tonella, Alessandra Potrich
COMPUTING
2007
101views more  COMPUTING 2007»
13 years 8 months ago
Reverse engineering with subdivision surfaces
Reverse engineering is concerned with the reconstruction of surfaces from three-dimensional point clouds originating from laser-scanned objects. We present an adaptive surface rec...
P. Keller, Martin Bertram, Hans Hagen
WCRE
2003
IEEE
14 years 1 months ago
An Experimentation Framework for Evaluating Disassembly and Decompilation Tools for C++ and Java
The inherent differences between C++ and Java programs dictate that the methods used for reverse engineering their compiled executables will be languagespecific. This paper looks ...
Lori Vinciguerra, Linda M. Wills, Nidhi Kejriwal, ...