Automated reverse engineering of hard-coded GUI layouts
AUIC '08 Proceedings of the ninth conference on Australasian user interface - Volume 76
A methodology for designing information security feedback based on User Interface Patterns
Advances in Engineering Software
Interface design technique considering visual cohesion-rate by object unit
HCI'07 Proceedings of the 12th international conference on Human-computer interaction: interaction platforms and techniques
Proceedings of the 2012 ACM international conference on Intelligent User Interfaces
Reverse engineering of GWT applications
Proceedings of the 4th ACM SIGCHI symposium on Engineering interactive computing systems
Integrating heterogeneous tools into model-centric development of interactive applications
MODELS'07 Proceedings of the 10th international conference on Model Driven Engineering Languages and Systems
Combining static and dynamic analysis for the reverse engineering of web applications
Proceedings of the 5th ACM SIGCHI symposium on Engineering interactive computing systems
Proceedings of the 25ième conférence francophone on l'Interaction Homme-Machine
Hi-index | 0.00 |
The final user interface of an information system could be reverse engineered according to a Model- Driven Engineering perspective to multiple levels of abstraction, either independently of each other or simultaneously depending on the designer's goals: concrete user interface (which is independent of the user interface toolkit), abstract user interface (which is independent of any interaction modality), and "task and concepts" (which is independent of any particular implementation). To support the user interface reverse engineering from the code level to any model level, a set of derivation rules have been implemented in ReversiXML. To support the user interface reverse engineering from any model to any other level, graph grammars have been implemented in TransformiXML. A graph grammar consists of graph transformation rules, called productions, that accept as input a graph representation of the user interface to be reengineered, apply the transformation, and obtain a result that can be further exploited to re-create a new user interface.