Sciweavers

1368 search results - page 3 / 274
» Understanding Software Systems Using Reverse Engineering Tec...
Sort
View
ICSE
1995
IEEE-ACM
13 years 11 months ago
Reverse Engineering of Legacy Systems: A Path Toward Success
This paper addresses the question of whether the reverse engineering of legacy systems is doomed to failure. Our position is that the answer is highly dependent on the specific go...
Alex Quilici
INFSOF
2006
102views more  INFSOF 2006»
13 years 7 months ago
Comparison of software architecture reverse engineering methods
Problems related to interactions between components is a sign of problems with the software architecture of the system and are often costly to fix. Thus it is very desirable to id...
Catherine Stringfellow, C. D. Amory, Dileep Potnur...
WCRE
2005
IEEE
14 years 1 months ago
Deobfuscation: Reverse Engineering Obfuscated Code
In recent years, code obfuscation has attracted attention as a low cost approach to improving software security by making it difficult for attackers to understand the inner worki...
Sharath K. Udupa, Saumya K. Debray, Matias Madou
ICSM
1995
IEEE
13 years 11 months ago
Domain-retargetable reverse engineering. III. Layered modeling
This paper describes ongoing work on a domainretargetable reverse engineering environment which is used to aid the structural understanding of large information spaces. In particu...
Scott R. Tilley
ICSE
2008
IEEE-ACM
14 years 7 months ago
Using software engineering technology to improve the quality of medical processes
In this paper, we describe some of the key observations resulting from our work on using software engineering technologies to help detect errors in medical processes. In many ways...
Lori A. Clarke, George S. Avrunin, Leon J. Osterwe...