Sciweavers

726 search results - page 68 / 146
» Reverse engineering: a roadmap
Sort
View
DRM
2003
Springer
14 years 3 months ago
Obfuscation of design intent in object-oriented applications
Protection of digital data from unauthorized access is of paramount importance. In the past several years, much research has concentrated on protecting data from the standpoint of...
Mikhail Sosonkin, Gleb Naumovich, Nasir D. Memon
BMCBI
2007
179views more  BMCBI 2007»
13 years 10 months ago
Automated smoother for the numerical decoupling of dynamics models
Background: Structure identification of dynamic models for complex biological systems is the cornerstone of their reverse engineering. Biochemical Systems Theory (BST) offers a pa...
Marco Vilela, Carlos Cristiano H. Borges, Susana V...
MOBIDE
2003
ACM
14 years 3 months ago
Semantically driven service interoperability for pervasive computing
The common vision of pervasive computing environments requires a very large range of devices and software components to interoperate seamlessly. From the assumption that these dev...
Declan O'Sullivan, David Lewis
ICSE
2001
IEEE-ACM
14 years 2 months ago
Functional Paleontology: System Evolution as the User Sees It
It has long been accepted that requirements analysis should precede architectural design and implementation, but in software evolution and reverse engineering this concern with bl...
Annie I. Antón, Colin Potts
SIGSOFT
2003
ACM
14 years 10 months ago
Context-sensitive slicing of concurrent programs
Program slicing is a technique to identify statements that may influence the computations at other statements. Precise slicing has been shown to be undecidable for concurrent prog...
Jens Krinke