Sciweavers

761 search results - page 23 / 153
» Reverse engineering MAC
Sort
View
WSR
2008
13 years 9 months ago
Graph Technology in Reverse Engineering: The TGraph Approach
: TGraphs are directed graphs with typed, attributed, and ordered nodes and edges. These properties leverage the use of graphs as models for all kinds of artifacts in the context o...
Jürgen Ebert, Volker Riediger, Andreas Winter
DAGSTUHL
2001
13 years 9 months ago
Software Visualization for Reverse Engineering
This article describes the Bauhaus tool suite as a concrete example for software visualization in reverse engineering, re-engineering, and software maintenance. Results from a rec...
Rainer Koschke
APCCM
2009
13 years 9 months ago
Reverse Engineering of XML Schemas to Conceptual Diagrams
It is frequent in practice that different logical XML schemas representing the same reality from different viewpoints exist. There is also usually a conceptual diagram modeling th...
Martin Necasky
NDSS
2008
IEEE
14 years 2 months ago
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution
Protocol reverse engineering has often been a manual process that is considered time-consuming, tedious and error-prone. To address this limitation, a number of solutions have rec...
Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, Xiangyu Zh...
WCRE
1993
IEEE
14 years 2 days ago
A Practical Program Transformation System for Reverse Engineering
Program transformation systems provide one means of formally deriving a program from its speci cation. The main advantage of this development method is that the executable program...
M. Ward, K. Bennett