{"title":"使用Petri网逆向工程Java应用程序的自动化方法","authors":"Jared Fuhs, James Cannady","doi":"10.1109/SECON.2004.1287903","DOIUrl":null,"url":null,"abstract":"In this paper, we propose a new approach for reverse engineering Java applications into Petri Net structures. Our approach rests on utilizing the foundations of Petri Nets as a means of uncovering certain attributes of interests. Petri Nets offers techniques of predicting path execution, flow complexity, dead paths, and resource utilization. The conclusion of this work will provide the strengths and weaknesses of using this approach along with future recommendations of research.","PeriodicalId":324953,"journal":{"name":"IEEE SoutheastCon, 2004. Proceedings.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"An Automated Approach in Reverse Engineering Java Applications Using Petri Nets\",\"authors\":\"Jared Fuhs, James Cannady\",\"doi\":\"10.1109/SECON.2004.1287903\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we propose a new approach for reverse engineering Java applications into Petri Net structures. Our approach rests on utilizing the foundations of Petri Nets as a means of uncovering certain attributes of interests. Petri Nets offers techniques of predicting path execution, flow complexity, dead paths, and resource utilization. The conclusion of this work will provide the strengths and weaknesses of using this approach along with future recommendations of research.\",\"PeriodicalId\":324953,\"journal\":{\"name\":\"IEEE SoutheastCon, 2004. Proceedings.\",\"volume\":\"25 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2004-03-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE SoutheastCon, 2004. Proceedings.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SECON.2004.1287903\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE SoutheastCon, 2004. Proceedings.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECON.2004.1287903","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Automated Approach in Reverse Engineering Java Applications Using Petri Nets
In this paper, we propose a new approach for reverse engineering Java applications into Petri Net structures. Our approach rests on utilizing the foundations of Petri Nets as a means of uncovering certain attributes of interests. Petri Nets offers techniques of predicting path execution, flow complexity, dead paths, and resource utilization. The conclusion of this work will provide the strengths and weaknesses of using this approach along with future recommendations of research.