In: ICSOFT 2010 : proceedings of the 5th International Conference on Software and Data Technologies, Athens, Greece, July 22-24. Setúbal : SciTePress, 2010, vol. 2, p. 232-237
During the development of a legacy system reverse engineering method we developed a technique to help with the recovery of the system’s use-cases. In fact, our reverse-engineering method starts with the re-documentation of the system’s use-case by observing its actual users. But these use-cases are never complete and accurate. In particular, the many alternative flows are often overlooked by...
|
This report is the collection of the presentations from the CRAG members to the second internal research day of HEG that has been organized at the HEG on April 24th, 2009.
|
In: ISEC’09 : proceedings of the 2009 India Software Engineering Conference, Pune, India, February 23-26, 2009. New York : Association for Computing Machinery, 2009, p. 65-73
When trying to reverse engineer software, execution trace analysis is increasingly used. Though, by using this technique we are quickly faced with an enormous amount of data that we must process. While many solutions have been proposed that consist of summarizing, filtering or compressing the trace, the lossless techniques are seldom able to cope with millions of events. Then, we developed a...
|
This report is the collection of the presentations from the CRAG members to the first international research day of HEG that has been organized at the HEG on September 28th, 2007.
|