Sciweavers

761 search results - page 61 / 153
» Reverse engineering MAC
Sort
View
ICSE
2005
IEEE-ACM
14 years 8 months ago
Tool support for just-in-time architecture reconstruction and evaluation: an experience report
The need for software architecture evaluation has drawn considerable attention in recent years. In practice, this is a challenging exercise for two main reasons. First, in deploye...
Ian Gorton, Liming Zhu
ECLIPSE
2006
ACM
14 years 2 months ago
Fine-grained processing of CVS archives with APFEL
In this paper, we present the APFEL plug-in that collects finegrained changes from version archives in a database. APFEL is built upon the Eclipse infrastructure for CVS and Java....
Thomas Zimmermann
C3S2E
2009
ACM
14 years 2 days ago
A verification framework for access control in dynamic web applications
This paper proposes a security analysis framework for dynamic web applications. A reverse engineering process is performed over a dynamic web application to extract a rolebased ac...
Manar H. Alalfi, James R. Cordy, Thomas R. Dean
INDIASE
2009
ACM
14 years 2 months ago
Computing dynamic clusters
When trying to reverse engineer software, execution trace analysis is increasingly used. Though, by using this technique we are quickly faced with an enormous amount of data that ...
Philippe Dugerdil, Sebastien Jossi
GECCO
2010
Springer
173views Optimization» more  GECCO 2010»
13 years 8 months ago
Superstate identification for state machines using search-based clustering
State machines are a popular method of representing a syshigh level of abstraction that enables developers to gain an overview of the system they represent and quickly understand ...
Mathew Hall, Phil McMinn, Neil Walkinshaw