Sciweavers

95 search results - page 6 / 19
» Integrating Reverse Engineering Tools Using a Service-Sharin...
Sort
View
VEE
2012
ACM
238views Virtualization» more  VEE 2012»
13 years 5 months ago
Replacement attacks against VM-protected applications
Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software p...
Sudeep Ghosh, Jason Hiser, Jack W. Davidson
OOPSLA
2005
Springer
15 years 2 months ago
Using refactorings to automatically update component-based applications
Frameworks and libraries change their APIs during evolution. Migrating an application to the new API is tedious and disrupts the development process. Although some tools and techn...
Danny Dig
ICSE
2005
IEEE-ACM
15 years 9 months ago
Clinical requirements engineering
In this paper, I make a case for integration of requirements engineering (RE) with clinical disciplines. To back my case, I look at two examples that employ a clinical RE approach...
Stephen Fickas
IRI
2007
IEEE
15 years 3 months ago
Question Driven Semantics Interpretation for Collaborative Knowledge Engineering and Ontology Reuse
Ontology integration, alignment, and reuse are at the heart of Semantic Web vision. The alignment between two ontologies can be achieved easily provided both share the same axioma...
Khalid Latif, Edgar Weippl, A. Min Tjoa
75
Voted
GECCO
2006
Springer
253views Optimization» more  GECCO 2006»
15 years 1 months ago
A novel approach to optimize clone refactoring activity
Achieving a high quality and cost-effective tests is a major concern for software buyers and sellers. Using tools and integrating techniques to carry out low cost testing are chal...
Salah Bouktif, Giuliano Antoniol, Ettore Merlo, Ma...