Sciweavers

126 search results - page 21 / 26
» Reverse engineering of object oriented code
Sort
View
WCRE
2002
IEEE
14 years 16 days ago
A Methodology for Developing Transformations Using the Maintainability Soft-Goal Graph
Over the past few years, we are experiencing a surge of evolution problems related to legacy object-oriented systems. Object orientation provides means for systems to be well-desi...
Ladan Tahvildari, Kostas Kontogiannis
WCRE
2006
IEEE
14 years 1 months ago
Extracting Output Formats from Executables
We describe the design and implementation of FFE/x86 (File-Format Extractor for x86), an analysis tool that works on stripped executables (i.e., neither source code nor debugging ...
Junghee Lim, Thomas W. Reps, Ben Liblit
WCRE
2005
IEEE
14 years 1 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean
ICSEA
2007
IEEE
14 years 1 months ago
DEUCE : Separating Concerns in User Interfaces
—As current software systems evolve continuously, both the application and its user interface (UI) have to be adapted. However, UI code is often scattered through and entangled w...
Sofie Goderis, Dirk Deridder, Ellen Van Paesschen
ICSE
1997
IEEE-ACM
13 years 11 months ago
Visualizing Interactions in Program Executions
Implementing, validating, modifying, or reengineering an object-oriented system requires an understanding of the object and class interactions which occur as a program executes. T...
Dean F. Jerding, John T. Stasko, Thomas Ball