Sciweavers

1153 search results - page 100 / 231
» Reversing graph transformations
Sort
View
90
Voted
BIRTHDAY
2005
Springer
15 years 8 months ago
Changing Labels in the Double-Pushout Approach Can Be Treated Categorically
In the double-pushout approach to graph transformations, most authors assume the left-hand side to be injective, since the noninjective case leads to ambiguous results. Taking into...
Hans Jürgen Schneider
102
Voted
DAGSTUHL
2006
15 years 4 months ago
Rule-based Model Extraction from Source Code
Abstract. In the context of an approach for reengineering legacy software systems at the architectural level, we present in this paper a reverse engineering methodology that uses a...
Rui Correia, Carlos M. P. Matos, Mohammad El-Ramly...
DRM
2005
Springer
15 years 8 months ago
Control flow based obfuscation
A software obfuscator is a program O to transform a source program P for protection against malicious reverse engineering. O should be correct (O(P) has same functionality with P)...
Jun Ge, Soma Chaudhuri, Akhilesh Tyagi
120
Voted
TOSEM
2002
153views more  TOSEM 2002»
15 years 2 months ago
Automated abstraction of class diagrams
d Abstraction of Class Diagrams ALEXANDER EGYED Teknowledge Corporation Designers can easily become overwhelmed with details when dealing with large class diagrams. icle presents a...
Alexander Egyed
131
Voted
DAWAK
2009
Springer
15 years 11 days ago
Towards a Modernization Process for Secure Data Warehouses
Data Warehouses (DW) manage crucial enterprise information used for the decision making process which has to be protected from unauthorized accesses. However, security constraints ...
Carlos Blanco, Ricardo Pérez-Castillo, Arnu...