Sciweavers

1281 search results - page 88 / 257
» Software Visualization for Reverse Engineering
Sort
View
ICSE
1998
IEEE-ACM
14 years 1 months ago
Extracting Concepts from File Names: A New File Clustering Criterion
Decomposing complex software systems into conceptually independent subsystems is a significant software engineering activity which received considerable research attention. Most o...
Nicolas Anquetil, Timothy Lethbridge
AUIC
2000
IEEE
14 years 1 months ago
The Metaphor of the Face as an Interface for Communicating Non-Quantitative Information
In this paper we propose that a metaphor can be used to represent domains that are not easily quantifiable. The metaphor then can be used as an interface to communicate informatio...
Simeon J. Simoff, Fay Sudweeks
UIST
1998
ACM
14 years 1 months ago
Of Vampire Mirrors and Privacy Lamps: Privacy Management in Multi-User Augmented Environments
We consider the problem of privacy in a 3D multi-user collaborative environment. We assume that information objects are represented by visual icons, and can either be public or pr...
Andreas Butz, Clifford Beshers, Steven Feiner
IWPC
2007
IEEE
14 years 3 months ago
Metrics for Measuring the Effectiveness of Decompilers and Obfuscators
Java developers often use decompilers to aid reverse engineering and obfuscators to prevent it. Decompilers translate low-level class files to Java source and can produce “good...
Nomair A. Naeem, Michael Batchelder, Laurie J. Hen...
CSMR
2005
IEEE
14 years 2 months ago
Towards the Automatic Evolution of Reengineering Tools
Building reverse engineering or reengineering tools often requires parsers for many different programming languages. The diffusion of dialects and variants makes many available pa...
Massimiliano Di Penta, Kunal Taneja