Sciweavers

677 search results - page 66 / 136
» Reverse Engineering Super-Repositories
Sort
View
WCRE
2006
IEEE
14 years 3 months ago
An Orchestrated Multi-view Software Architecture Reconstruction Environment
Most approaches in reverse engineering literature generate a single view of a software system that restricts the scope of the reconstruction process. We propose an orchestrated se...
Kamran Sartipi, Nima Dezhkam, Hossein Safyallah
DRM
2007
Springer
14 years 3 months ago
Slicing obfuscations: design, correctness, and evaluation
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
WCRE
2007
IEEE
14 years 3 months ago
Lossless Comparison of Nested Software Decompositions
Reverse engineering legacy software systems often involves the employment of clustering algorithms that automatically decompose a software system into subsystems. The decompositio...
Mark Shtern, Vassilios Tzerpos
WCRE
2007
IEEE
14 years 3 months ago
Parametric Process Model Inference
Legacy applications can be difficult and time-consuming to understand and update due to the lack of modern abstraction mechanisms in legacy languages, as well as the gradual dete...
Saurabh Sinha, G. Ramalingam, Raghavan Komondoor
WCRE
2003
IEEE
14 years 2 months ago
Completeness of a Fact Extractor
The process of software reverse engineering commonly uses an extractor, which parses source code and extracts facts about the code. The level of detail in these facts varies from ...
Yuan Lin, Richard C. Holt, Andrew J. Malton