Sciweavers

761 search results - page 14 / 153
» Reverse engineering MAC
Sort
View
ICSE
1997
IEEE-ACM
14 years 3 days ago
Rigi: A Visualization Environment for Reverse Engineering
The Rigi reverse engineering system provides two contrasting approaches for presenting software structures in its graph editor. The rst displays the structures through multiple, i...
Margaret-Anne D. Storey, Kenny Wong, Hausi A. M&uu...
SIGSOFT
1994
ACM
14 years 16 hour ago
A New Model of Program Dependences for Reverse Engineering
A dependence model for reverse engineering should treat procedures in a modular fashion and should be fine-grained, distinguishing dependences that are due to different variables....
Daniel Jackson, Eugene J. Rollins
PPPJ
2006
ACM
14 years 1 months ago
Experiences with the development of a reverse engineering tool for UML sequence diagrams: a case study in modern Java developmen
The development of a tool for reconstructing UML sequence diagrams from executing Java programs is a challenging task. We implemented such a tool designed to analyze any kind of J...
Matthias Merdes, Dirk Dorsch
IEEEIAS
2007
IEEE
14 years 2 months ago
Metrics-based Evaluation of Slicing Obfuscations
An obfuscation aims to transform a program, without affecting its functionality, so that some secret data within the program can be hidden for as long as possible from an adversar...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
SYNASC
2006
IEEE
105views Algorithms» more  SYNASC 2006»
14 years 1 months ago
A Meta-Model for Enterprise Applications
In the last years, as object-oriented software systems became more and more complex, the need of performing automatically reverse engineering upon these systems has increased sign...
Cristina Marinescu, Ioan Jurca