Model-driven reverse engineering approaches: A systematic literature review

C Raibulet, FA Fontana, M Zanoni - Ieee Access, 2017 - ieeexplore.ieee.org
This paper explores and describes the state of the art for what concerns the model-driven
approaches proposed in the literature to support reverse engineering. We conducted a …

Model-Driven Approaches for Reverse Engineering - A Systematic Literature Review

HA Siala, K Lano, H Alfraihi - IEEE Access, 2024 - ieeexplore.ieee.org
Many organizations depend on software systems to accomplish their daily tasks, but these
systems need to be maintained and evolved to cope with various changes and …

Model-driven round-trip engineering for TinyOS-based WSN applications

H Marah, G Kardas, M Challenger - Journal of Computer Languages, 2021 - Elsevier
Abstract Wireless Sensor Network (WSN) applications working on TinyOS operating system
is widely used in various areas. However, the requirement of managing the power …

An empirical study of data constraint implementations in java

JM Florez, L Moreno, Z Zhang, S Wei… - Empirical Software …, 2022 - Springer
Software systems are designed according to guidelines and constraints defined by business
rules. Some of these constraints define the allowable or required values for data handled by …

Formal verification of a decision-tree ensemble model and detection of its violation ranges

N Sato, H Kuruma, Y Nakagawa… - … on Information and …, 2020 - search.ieice.org
As one type of machine-learning model, a “decision-tree ensemble model”(DTEM) is
represented by a set of decision trees. A DTEM is mainly known to be valid for structured …

Extracting business rules from COBOL: A model-based framework

V Cosentino, J Cabot, P Albert… - 2013 20th Working …, 2013 - ieeexplore.ieee.org
Organizations rely on the logic embedded in their Information Systems for their daily
operations. This logic implements the business rules in place in the organization, which …

Retrieving data constraint implementations using fine-grained code patterns

JM Florez, J Perry, S Wei, A Marcus - Proceedings of the 44th …, 2022 - dl.acm.org
Business rules are an important part of the requirements of software systems that are meant
to support an organization. These rules describe the operations, definitions, and constraints …

Model-based analysis of Java EE web security misconfigurations

S Martínez, V Cosentino, J Cabot - Computer Languages, Systems & …, 2017 - Elsevier
The Java EE framework, a popular technology of choice for the development of web
applications, provides developers with the means to define access-control policies to protect …

Specification extraction by symbolic execution

J Pichler - 2013 20th working conference on reverse …, 2013 - ieeexplore.ieee.org
Technical software systems contain extensive and complex computations that are frequently
implemented in an optimized and unstructured way. Computations are, therefore, hard to …

[Engineering Paper] Graal: The Quest for Source Code Knowledge

V Cosentino, S Duenas, A Zerouali… - 2018 IEEE 18th …, 2018 - ieeexplore.ieee.org
Source code analysis tools are designed to analyze code artifacts with different intents,
which span from improving the quality and security of the software to easing refactoring and …