Sciweavers

1281 search results - page 80 / 257
» Software Visualization for Reverse Engineering
Sort
View
DRM
2005
Springer
14 years 2 months ago
Control flow based obfuscation
A software obfuscator is a program O to transform a source program P for protection against malicious reverse engineering. O should be correct (O(P) has same functionality with P)...
Jun Ge, Soma Chaudhuri, Akhilesh Tyagi
HCI
2007
13 years 10 months ago
Agile Methods and Visual Specification in Software Development: A Chance to Ensure Universal Access
Within the eEurope2010 initiative “An Information Society for All”, development methods which enable the inclusion of the end-user become essential in order to ensure the parad...
Thomas Memmel, Harald Reiterer, Andreas Holzinger
ICSM
2003
IEEE
14 years 2 months ago
Deriving tolerant grammars from a base-line grammar
A grammar-based approach to tool development in re- and reverse engineering promises precise structure awareness, but it is problematic in two respects. Firstly, it is a considera...
Steven Klusener, Ralf Lämmel
MSR
2006
ACM
14 years 2 months ago
How long did it take to fix bugs?
The number of bugs (or fixes) is a common factor used to measure the quality of software and assist bug related analysis. For example, if software files have many bugs, they may b...
Sunghun Kim, E. James Whitehead Jr.
KBSE
2005
IEEE
14 years 2 months ago
Visualization-based analysis of quality for large-scale software systems
We propose an approach for complex software analysis based on visualization. Our work is motivated by the fact that in spite of years of research and practice, software developmen...
Guillaume Langelier, Houari A. Sahraoui, Pierre Po...