Sciweavers

ASE
2007
143views more  ASE 2007»
13 years 4 months ago
Composition inference for UML class diagrams
Knowing which associations are compositions is important in a tool for the reverse engineering of UML class diagrams. Firstly, recovery of composition relationships bridges the ga...
Ana Milanova
COODBSE
1994
85views more  COODBSE 1994»
13 years 5 months ago
Understanding Software Systems Using Reverse Engineering Technology
Software engineering research has focused primarily on software construction, neglecting software maintenance and evolution. Observed is a shift in research from synthesis to anal...
Hausi A. Müller, Kenny Wong, Scott R. Tilley
DAGSTUHL
2001
13 years 5 months ago
An Overview of the GXL Graph Exchange Language
GXL (Graph eXchange Language) is designed to be a standard exchange format for graph-based tools. GXL is defined as an XML sublanguage, which offers support for exchanging instanc...
Andreas Winter, Bernt Kullbach, Volker Riediger
BIOCOMP
2006
13 years 5 months ago
Reverse Engineering Approach in Molecular Evolution: Simulation and Case Study with Enzyme Proteins
- We developed a method of reverse engineering to compare the behaviour the enzyme proteins with the existing standard concepts. Our work is based on the strong assumption from the...
Sukanya Manna, Cheng-Yuan Liou
HCI
2007
13 years 6 months ago
Musculoskeletal and Performance Effects of Monocular Display Augmented, Articulated Arm Based Laser Digitizing
Abstract. Processes of capturing solid geometry features as threedimensional data for analysis, simulation, or reverse engineering require the use of laser-based reverse engineerin...
Neil Littell, Kari Babski-Reeves, Gary McFadyen, J...
DAS
2006
Springer
13 years 6 months ago
XCDF: A Canonical and Structured Document Format
Accessing the structured content of PDF document is a difficult task, requiring pre-processing and reverse engineering techniques. In this paper, we first present different methods...
Jean-Luc Bloechle, Maurizio Rigamonti, Karim Hadja...
AICCSA
2005
IEEE
82views Hardware» more  AICCSA 2005»
13 years 6 months ago
Reverse engineering of framework design using a meta-patterns-based approach
Object-oriented frameworks are a powerful reuse technique but they are also very complex and difficult to design. Framework’s design aims at separating the invariant aspects acr...
Nuno Flores, Ademar Aguiar
CCS
2008
ACM
13 years 6 months ago
Towards experimental evaluation of code obfuscation techniques
While many obfuscation schemes proposed, none of them satisfy any strong definition of obfuscation. Furthermore secure generalpurpose obfuscation algorithms have been proven to be...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...
CCS
2008
ACM
13 years 6 months ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...
CCS
2008
ACM
13 years 6 months ago
Tupni: automatic reverse engineering of input formats
Recent work has established the importance of automatic reverse engineering of protocol or file format specifications. However, the formats reverse engineered by previous tools ha...
Weidong Cui, Marcus Peinado, Karl Chen, Helen J. W...