Sciweavers

365 search results - page 16 / 73
» Extracting Business Rules from Source Code
Sort
View
DCC
2009
IEEE
15 years 6 months ago
Slepian-Wolf Coding of Binary Finite Memory Source Using Burrows-Wheeler Transform
Abstract—In this paper, an asymmetric Slepian-Wolf coding (SWC) scheme for binary finite memory source (FMS) is proposed. The a priori information about the source is extracted ...
Chao Chen, Xiangyang Ji, Qionghai Dai, Xiaodong Li...
SCAM
2008
IEEE
15 years 6 months ago
The Evolution and Decay of Statically Detected Source Code Vulnerabilities
The presence of vulnerable statements in the source code is a crucial problem for maintainers: properly monitoring and, if necessary, removing them is highly desirable to ensure h...
Massimiliano Di Penta, Luigi Cerulo, Lerina Aversa...
CIMCA
2005
IEEE
15 years 5 months ago
Improving Rule Generation Precision for Domain Knowledge based Wrappers
Wrappers play an important role in extracting specified information from various sources. Wrapper rules by which information is extracted are often created from the domain-specifi...
Chang-Hoo Jeong, Sung-Jin Jhun, Myung-Eun Lim, Sun...
APSEC
2002
IEEE
15 years 4 months ago
Quality Driven Transformation Compositions for Object Oriented Migration
Reengineering legacy software systems to object oriented platforms has received significant attention over the past few years. In this paper, we propose a goal driven software mig...
Ying Zou, Kostas Kontogiannis
RE
2005
Springer
15 years 5 months ago
Reverse Engineering Goal Models from Legacy Code
A reverse engineering process aims at reconstructing el abstractions from source code. This paper presents a novel reverse engineering methodology for recovering stakeholder goal ...
Yijun Yu, Yiqiao Wang, John Mylopoulos, Sotirios L...