Sciweavers

5766 search results - page 19 / 1154
» Reverse Engineering of Data
Sort
View
DAWAK
2009
Springer
14 years 7 months ago
Towards a Modernization Process for Secure Data Warehouses
Data Warehouses (DW) manage crucial enterprise information used for the decision making process which has to be protected from unauthorized accesses. However, security constraints ...
Carlos Blanco, Ricardo Pérez-Castillo, Arnu...
SIGSOFT
2010
ACM
14 years 7 months ago
Software is data too
Software systems are designed and engineered to process data. However, software is data too. The size and variety of today's software artifacts and the multitude of stakehold...
Andrian Marcus, Tim Menzies
IWPC
1996
IEEE
15 years 1 months ago
Extracting Business Rules from Source Code
This paper reviews the state of the art on application knowledge acquisiton from existing software systems and defines the role of business rules. It then goes on to present a met...
Harry M. Sneed, Katalin Erdös
ICSE
1995
IEEE-ACM
15 years 1 months ago
Reverse Engineering of Legacy Code Exposed
— Reverse engineering of large legacy software systems generally cannot meet its objectives because it cannot be cost-effective. There are two main reasons for this. First, it is...
Bruce W. Weide, Wayne D. Heym, Joseph E. Hollingsw...
WCRE
2008
IEEE
15 years 4 months ago
Reverse Engineering CAPTCHAs
CAPTCHAs are automated Turing tests used to determine if the end-user is human and not an automated program. Users are asked to read and answer Visual CAPTCHAs, which often appear...
Abram Hindle, Michael W. Godfrey, Richard C. Holt