Reverse engineering

Top PDF Reverse engineering:

A reverse engineering approach to framework comprehension

A reverse engineering approach to framework comprehension

... perspectives. Reverse engineering and software visualization systems are the lines of research that have made the most important contributions to the development of software comprehension support ...

20

ISO Tolerance specification in reverse engineering

ISO Tolerance specification in reverse engineering

... of Reverse Engineering, the sizes and tolerances are unknown and the scope of the measurement is to specify them instead of verifying the ...the Reverse Engineering process, the complete ...

8

Reverse engineering directed gene regulatory networks from transcriptomics and proteomics data of biomining bacterial communities with approximate Bayesian computation and steady state signalling simulations

Reverse engineering directed gene regulatory networks from transcriptomics and proteomics data of biomining bacterial communities with approximate Bayesian computation and steady state signalling simulations

... work reverse engineering, it was previously shown that consistent results could be obtained with an increase of 60% of the nodes in an analyzed network ...

15

BARF: a multiplatform open source binary analysis and reverse engineering framework

BARF: a multiplatform open source binary analysis and reverse engineering framework

... Abstract. The analysis of binary code is a crucial activity in many areas of the computer sciences and software engineering disciplines rang- ing from software security and program analysis to reverse ...

10

Ten years ago, a meaningful discussion of copyright law could focus almost exclusively on the federal copyright statute and related case law. At that time, the primary powers wielded by copyright holders were rights granted explicitly by the statute, such

Ten years ago, a meaningful discussion of copyright law could focus almost exclusively on the federal copyright statute and related case law. At that time, the primary powers wielded by copyright holders were rights granted explicitly by the statute, such

... as reverse engineering, and—unlike alternative approaches like bribing a rival’s employees or sneaking onto a rival’s premises at night—reverse engineering is a form of secret-stealing that ...

10

An ADM-Based Method for Migrating CMS-Based Web Applications

An ADM-Based Method for Migrating CMS-Based Web Applications

... The works (Garcia-Rodriguez de Guzman, Polo, & Piattini, 2006a), (Garcia-Rodriguez de Guzman, Polo, & Piattini, 2006b), (Garcia-Rodriguez de Guzman, Polo, & Piattini, 2007), (García-Rodríguez de Guzmán, ...

462

Comparación de dos métodos de diseño de implantes basados en tecnologías de ingeniería inversa, diseño e ingeniería, BIOCAD/CAD/CAE

Comparación de dos métodos de diseño de implantes basados en tecnologías de ingeniería inversa, diseño e ingeniería, BIOCAD/CAD/CAE

... Reverse Engineering is based on analysis and evaluation from existing models as reference for new solutions reconstruction, Lopes da Silva et al. (2009). With this approach, software tools as Bio- CAD ...

8

Implementación del modelo RIM de HL7 v3 en
orientación a objetos y su uso en procesos de
interoperabilidad semántica

Implementación del modelo RIM de HL7 v3 en orientación a objetos y su uso en procesos de interoperabilidad semántica

... El proyecto de Java en el que se ha realizado la herramienta contiene el fichero de Reverse Engineering y el fichero de configuración de Hibernate en su paquete por defecto y dos paque[r] ...

63

Improving web personalization re-engineering processes using cognitive knowledge management

Improving web personalization re-engineering processes using cognitive knowledge management

... -Reverse Engineering and Personalization Forward Engineering - This approach is based on concepts, methods and tools with a forcefulness totally proved by software and web applications ...

5

TítuloReverse Engineering and Security Evaluation of Commercial Tags for RFID Based IoT Applications

TítuloReverse Engineering and Security Evaluation of Commercial Tags for RFID Based IoT Applications

... for reverse-engineering microchips and, therefore, it can be used for studying the internal hardware of an RFID ...they reverse-engineered the security of MIFARE Classic cards (the authors first ...

31

Reverse logistics practices for recovering mobile phones in Spain

Reverse logistics practices for recovering mobile phones in Spain

... In this sense and from an environmental point of view, this option, which would lead us to the reutilisation of the product (directly or with little reconditioning), would give mobiles a second use and thus prolong their ...

22

Paleozoic to present-day kinematic evolution of the frontal part of the Andes between parallels 23º and 24º S (Jujuy province, Argentina)

Paleozoic to present-day kinematic evolution of the frontal part of the Andes between parallels 23º and 24º S (Jujuy province, Argentina)

... A fault that crops out at surface at the eastern portion of the transect and offsets the east limb of the Callilegua anticline (Subandean Ranges-Santa Barbara System), exhibits a thick sequence of Cretaceous deposits in ...

7

Cap. 5 phar 4 tech ed 4

Cap. 5 phar 4 tech ed 4

... Nucleoside Reverse Transcriptase Inhibitors (NRTIs). – abacavir (Ziagen) – didanosine (Videx) – emtricitabine (Emtriva).[r] ...

114

La noción de stakeholder en la Ingeniería de Requerimientos

La noción de stakeholder en la Ingeniería de Requerimientos

... “Requirements Engineering: Setting the Context,” in Engineering and Managing Software Requirements , Berlin Heidelberg: Springer-Verlag, 2005.. Coulin,.[r] ...

5

BIOCHEMICAL ENGINEERING AND BIOTECHNOLOGY

BIOCHEMICAL ENGINEERING AND BIOTECHNOLOGY

... The fermentation system can be conducted in a closed system as batch culture. The batch system growth kinetics and growth curve were explained in sections 5.2 and 5.3. The growth curve is the best representation of a ...

439

A Stochastic Bi-objective Location Model for Reverse Logistics

A Stochastic Bi-objective Location Model for Reverse Logistics

... Valuable commodities Collection. center[r] ...

42

Defending against cybercrime: advances in the detection of malicious servers and the analysis of client-side vulnerabilities

Defending against cybercrime: advances in the detection of malicious servers and the analysis of client-side vulnerabilities

... RevProbe identifies that 16% of malicious and 20% benign active IP addresses correspond to reverse proxies, that 92% of those are silent compared to 55% for benign reverse proxies, and t[r] ...

189

A Systems Engineering Approach to Curriculum Design. An Engineering Case Study

A Systems Engineering Approach to Curriculum Design. An Engineering Case Study

... Systems Engineering (SE) approach which can help to tackle the main problems related to curriculum design in the engineering ...Telecommunications Engineering (ETSIT) at the University of Málaga, ...

7

NTP 713: Carretillas elevadoras automotoras (I): conocimientos básicos para la prevención de riesgos

NTP 713: Carretillas elevadoras automotoras (I): conocimientos básicos para la prevención de riesgos

... La ya mencionada diversidad de equipos y utilizaciones pone de relieve la necesidad de una formación específica del operador para cada tipología de carretilla a fin de adquirir la "[r] ...

9

NTP 714: Carretillas elevadoras automotoras (II): principales peligros y medidas preventivas

NTP 714: Carretillas elevadoras automotoras (II): principales peligros y medidas preventivas

... (4) Para facilitar las maniobras marcha atrás, dotar al asiento del operador de un sistema que permita un giro de unos 30º (5) El descenso de pendientes se realizará siempre marcha atrás[r] ...

9

Show all 906 documents...