Future of Software Engineering (FOSE '07) 2007
DOI: 10.1109/fose.2007.15
|View full text |Cite
|
Sign up to set email alerts
|

New Frontiers of Reverse Engineering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
47
0
10

Year Published

2008
2008
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 116 publications
(57 citation statements)
references
References 111 publications
(130 reference statements)
0
47
0
10
Order By: Relevance
“…Classical reverse engineering techniques [5] such as static analysis, dynamic analysis, program slicing and dicing, formal concept analysis, subsystem decomposition, and so on, could be used to extract the knowledge from any software artifact and build the PSM model related to it. These PSM models are represented according to specific metamodels.…”
Section: Marblementioning
confidence: 99%
“…Classical reverse engineering techniques [5] such as static analysis, dynamic analysis, program slicing and dicing, formal concept analysis, subsystem decomposition, and so on, could be used to extract the knowledge from any software artifact and build the PSM model related to it. These PSM models are represented according to specific metamodels.…”
Section: Marblementioning
confidence: 99%
“…Program Analysis and application [6] 2. Architecture and Design Recovery [6] 3. Visualizations [6]-Software visualization being static in nature are used to visualize the components of the systems such as software artifacts, codes, complexities and dependencies, attributes the define the system.…”
Section: Areas Of Advancement In Reverse Engineeringmentioning
confidence: 99%
“…Canfora and Di Penta [4] describe two tools, Design Maintenance System [9] and TXL [10] which parse source code and, through rule-based transformations, produce artifacts that facilitate program understanding. Braun [11] describes a server-based analysis system based upon rules that is designed to play a role in configuration management of software.…”
Section: Related Workmentioning
confidence: 99%