Sciweavers

677 search results - page 31 / 136
» Reverse Engineering
Sort
View
IWPC
2006
IEEE
14 years 2 months ago
Integrating Reverse Engineering Tools Using a Service-Sharing Methodology
A common and difficult maintenance activity is the integration of existing software components or tools into a consistent and interoperable whole. One area in which this has prove...
Dean Jin, James R. Cordy
IWPC
2006
IEEE
14 years 2 months ago
Reverse Engineering Scripting Language Extensions
Software systems are often written in more than one programming language. During development, programmers need to understand not only the dependencies among code in a particular l...
Daniel L. Moise, Kenny Wong, H. James Hoover, Daqi...
KBSE
1997
IEEE
14 years 6 days ago
A Formal Automated Approach for Reverse Engineering Programs with Pointers
Given a program S and a precondition Q, the strongest postcondition, denoted sp(S Q), is defined as the strongest condition that holds after the execution of S, given that S term...
Gerald C. Gannod, Betty H. C. Cheng
STACS
2009
Springer
14 years 2 months ago
Reverse Engineering Prefix Tables
The Prefix table of a string reports for each position the maximal length of its prefixes starting here. The Prefix table and its dual Suffix table are basic tools used in the d...
Julien Clément, Maxime Crochemore, Giuseppi...
INFOCOM
2007
IEEE
14 years 2 months ago
Reverse Engineering TCP/IP-Like Networks Using Delay-Sensitive Utility Functions
Abstract— TCP/IP can be interpreted as a distributed primaldual algorithm to maximize aggregate utility over source rates. It has recently been shown that an equilibrium of TCP/I...
John Pongsajapan, Steven H. Low