Login / Signup

Configuration REcognition Model for Complex Reverse Engineering Methods: 2(CREM).

Karim HadjarOliver HitzLyse RobadeyRolf Ingold
Published in: Document Analysis Systems (2002)
Keyphrases
  • reverse engineering
  • high level
  • case study
  • probabilistic model
  • software engineering
  • recognition rate
  • parameter estimation
  • network model