Sciweavers

5766 search results - page 52 / 1154
» Reverse Engineering of Data
Sort
View
WCRE
2006
IEEE
15 years 3 months ago
Monitoring Requirements Coverage using Reconstructed Views: An Industrial Case Study
Requirements views, such as coverage and status views, are an important asset for monitoring and managing software development. We have developed a method that automates the proce...
Marco Lormans, Hans-Gerhard Groß, Arie van D...
FSTTCS
2007
Springer
15 years 1 months ago
Efficient and Expressive Tree Filters
Abstract. We investigate streaming evaluation of filters on XML documents, evaluated both at the root node and at an arbitrary node. Motivated by applications in protocol processin...
Michael Benedikt, Alan Jeffrey
ICSE
2007
IEEE-ACM
15 years 10 months ago
Ownership and Immutability Inference for UML-Based Object Access Control
We propose a mechanism for object access control which is based on the UML. Specifically, we propose use of ownership and immutability constraints on UML associations and verifica...
Yin Liu, Ana Milanova
WCRE
1995
IEEE
15 years 1 months ago
Observed Idiosyncracies of Relational Database Designs
Several processes have been advanced in the literature for reverse engineering of relational databases. The inputs to these processes are relational tables and available contextua...
Michael R. Blaha, William J. Premerlani
AMAST
2006
Springer
15 years 1 months ago
The Substitution Vanishes
Abstract. Accumulation techniques were invented to transform functional programs, which intensively use append functions (like inefficient list reversal), into more efficient progr...
Armin Kühnemann, Andreas Maletti