Reverse Engineering Tools as Media for Imperfect Knowledge

نویسندگان

  • Jens H. Weber
  • Andrew Walenstein
چکیده

Reverse engineering is an imperfect process driven by imperfect knowledge. Most current reverse engineering tools do not adequately consider these inherent characteristics. They focus on representing precise, complete, and consistent knowledge and work towards enforcing predejked structures on the processes. According to our experience, this design paradigm seriously limits human-centred reverse engineering tools. A n altogether different approach is to directly support the statement and subsequent resolution of imperfections. Doing so requires the iniperfect knowledge be represented and imperfect procedures accommodated for: This paper argues that effective tools need to act as a manipulable medium f o r imperfect knowledge and, based on our experiences with a prototype, elaborate requirements f o r such tools.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Tools Perspective on Software Reverse Engineering: Requirements, Construction, and Evaluation

Software reverse engineering is a subdiscipline of software engineering, striving to provide support for the comprehension of software systems by creating suitable representations of the system in another formor higher level of abstraction. In order to be effective, reverse engineering needs tool support, which provides functionality to extract low-level facts from the systems, to analyze and g...

متن کامل

Survey on Planar Drawing of Clustered Graphs

In recent years, there has been great interest in graph drawing to express relational information and applications range from CASE tools, reverse engineering, idea organization, and software design. However, as the graphs to be visualized become more and more complex, extended structured graph variations are needed. Clustered graphs are graphs with recursive clustering structures. The possible ...

متن کامل

Reverse Engineering Databases for Knowledge Discovery

Many data mining tools cannot be used directly to analyze the complex sets of relations which are found in large database systems. In our experience, data miners rely on a well-defined data model, or the knowledge of a data expert, to isolate and extract candidate data sets prior to mining the data. For many databases, typically large legacy systems, a reliable data model is often unavailable a...

متن کامل

An Evolutionary Knowledge-Based Framework for Reverse and Forward Engineering

The paper describes a knowledge-based framework for the development of program reverse and forward engineering. The substrate for this framework is an object-oriented environment for knowledge-based applications (XRL) written in Common Lisp. The approach starts from the idea that forward and reverse engineering are evolutive, knowledge intensive activities. Regarding the development of knowledg...

متن کامل

The Honeynet Files

System and file analysis An important part of honeypot forensics is system analysis, which we can do without any prior knowledge of the results obtained from network analysis. The system provides information in many ways: in system logs, in normal or enhanced logs generated with a syslogd-like service (such as a firewall, security, kernel, and so on), or from the tools the intruder uses (which ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000