Sciweavers

DAWAK
2009
Springer
14 years 6 months ago
Towards a Modernization Process for Secure Data Warehouses
Data Warehouses (DW) manage crucial enterprise information used for the decision making process which has to be protected from unauthorized accesses. However, security constraints ...
Carlos Blanco, Ricardo Pérez-Castillo, Arnu...
77
Voted
ICSM
1995
IEEE
15 years 11 days ago
Domain-retargetable reverse engineering. III. Layered modeling
This paper describes ongoing work on a domainretargetable reverse engineering environment which is used to aid the structural understanding of large information spaces. In particu...
Scott R. Tilley
76
Voted
ICSE
1995
IEEE-ACM
15 years 11 days ago
Reverse Engineering of Legacy Systems: A Path Toward Success
This paper addresses the question of whether the reverse engineering of legacy systems is doomed to failure. Our position is that the answer is highly dependent on the specific go...
Alex Quilici
79
Voted
WCRE
2003
IEEE
15 years 2 months ago
Fuzzy Extensions for Reverse Engineering Repository Models
Reverse Engineering is a process fraught with imperfections. The importance of dealing with non-precise, possibly inconsistent data explicitly when interacting with the reverse en...
Ulrike Kölsch, René Witte