Sciweavers

684 search results - page 8 / 137
» Reverse Engineering CAPTCHAs
Sort
View
ICSE
1995
IEEE-ACM
15 years 1 months ago
Reverse Engineering of Legacy Code Exposed
— Reverse engineering of large legacy software systems generally cannot meet its objectives because it cannot be cost-effective. There are two main reasons for this. First, it is...
Bruce W. Weide, Wayne D. Heym, Joseph E. Hollingsw...
ICSE
2000
IEEE-ACM
15 years 1 months ago
Reverse engineering: a roadmap
By the early 1990s the need for reengineering legacy systems was already acute, but recently the demand has increased significantly with the shift toward web-based user interfaces...
Hausi A. Müller, Jens H. Jahnke, Dennis B. Sm...
EVOW
2007
Springer
15 years 3 months ago
Bio-mimetic Evolutionary Reverse Engineering of Genetic Regulatory Networks
The effective reverse engineering of biochemical networks is one of the great challenges of systems biology. The contribution of this paper is two-fold: 1) We introduce a new meth...
Daniel Marbach, Claudio Mattiussi, Dario Floreano
CSMR
2003
IEEE
15 years 3 months ago
Transparent Reverse Engineering Tool Integration Using a Conceptual Transaction Adapter
In this paper we present a proposal for a novel approach to facilitating transparent interoperability among reverse engineering tools. We characterize the architectural and operat...
Dean Jin, James R. Cordy, Thomas R. Dean
WCRE
1999
IEEE
15 years 1 months ago
A Formal Approach for Reverse Engineering: A Case Study
As a program evolves, it becomes increasingly difficult to understand and reason about changes in the source code. Eventually, if enough changes are made, reverse engineering and ...
Gerald C. Gannod, Betty H. C. Cheng