Sciweavers

70 search results - page 1 / 14
» Reverse engineering under siege
Sort
View
CACM
2002
60views more  CACM 2002»
13 years 4 months ago
Reverse engineering under siege
Pamela Samuelson
CSMR
2010
IEEE
12 years 12 months ago
Reverse Engineering Component Models for Quality Predictions
Legacy applications are still widely spread. If a need to change deployment or update its functionality arises, it becomes difficult to estimate the performance impact of such modi...
Steffen Becker, Michael Hauck, Mircea Trifu, Klaus...
IWPC
2008
IEEE
13 years 11 months ago
Re-Engineering a Reverse Engineering Portal to a Distributed SOA
REportal is an existing web-based reverse engineering portal web site that provides access to a suite of reverse engineering and program comprehension tools via a web This abstrac...
William M. Mongan, Maxim Shevertalov, Spiros Manco...
CSMR
2010
IEEE
12 years 12 months ago
Under and Over Approximation of State Models Recovered for Ajax Applications
Abstract--In contrast to conventional multi-page Web applications, an Ajax application is developed as a single-page application in which content and structure are changed at runti...
Alessandro Marchetto, Paolo Tonella, Filippo Ricca
TCBB
2010
137views more  TCBB 2010»
12 years 11 months ago
The Metropolized Partial Importance Sampling MCMC Mixes Slowly on Minimum Reversal Rearrangement Paths
Markov chain Monte Carlo has been the standard technique for inferring the posterior distribution of genome rearrangement scenarios under a Bayesian approach. We present here a neg...
István Miklós, Bence Melykuti, Krist...