Sciweavers

1281 search results - page 82 / 257
» Software Visualization for Reverse Engineering
Sort
View
AVI
2000
13 years 10 months ago
A Visual Tool for Querying Geographic Databases
To support users in querying geographic databases we have developed a system that lets people sketch what they are looking for. It closes the gap between user and information syst...
Andreas D. Blaser, Max J. Egenhofer
ICSE
2008
IEEE-ACM
14 years 9 months ago
Benefits of interactive display environments in the software development process
Models become increasingly important for software development processes. Though there is a multitude of software modeling tools available, the handling of diagrams is still diffic...
Mathias Frisch, Raimund Dachselt
VEE
2012
ACM
238views Virtualization» more  VEE 2012»
12 years 4 months ago
Replacement attacks against VM-protected applications
Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software p...
Sudeep Ghosh, Jason Hiser, Jack W. Davidson
WCRE
2006
IEEE
14 years 2 months ago
Mining Control Flow Graphs for Crosscutting Concerns
Aspect mining tries to identify crosscutting concerns in existing systems and thus supports the adaption to an aspect-oriented design. This paper describes an automatic static asp...
Jens Krinke
WCRE
2008
IEEE
14 years 3 months ago
Workshop on Program Comprehension Through Dynamic Analysis (PCODA'08)
Applying program comprehension techniques may render software maintenance and evolution easier. Understanding a software system typically requires a combination of static and dyna...
Andy Zaidman, Abdelwahab Hamou-Lhadj, Orla Greevy,...