Sciweavers

677 search results - page 19 / 136
» Domain-Retargetable Reverse Engineering
Sort
View
IWPC
2006
IEEE
14 years 2 months ago
Reverse Engineering Scripting Language Extensions
Software systems are often written in more than one programming language. During development, programmers need to understand not only the dependencies among code in a particular l...
Daniel L. Moise, Kenny Wong, H. James Hoover, Daqi...
STACS
2009
Springer
14 years 3 months ago
Reverse Engineering Prefix Tables
The Prefix table of a string reports for each position the maximal length of its prefixes starting here. The Prefix table and its dual Suffix table are basic tools used in the d...
Julien Clément, Maxime Crochemore, Giuseppi...
INFOCOM
2007
IEEE
14 years 2 months ago
Reverse Engineering TCP/IP-Like Networks Using Delay-Sensitive Utility Functions
Abstract— TCP/IP can be interpreted as a distributed primaldual algorithm to maximize aggregate utility over source rates. It has recently been shown that an equilibrium of TCP/I...
John Pongsajapan, Steven H. Low
ECMDAFA
2007
Springer
100views Hardware» more  ECMDAFA 2007»
14 years 2 months ago
Reverse Engineering Models from Traces to Validate Distributed Systems - An Industrial Case Study
The paper targets the applicability of model-driven methodologies to the validation of complex systems and presents a case study of a mobile radio network. Validation relies on the...
Andreas Ulrich, Alexandre Petrenko
IDEAL
2007
Springer
14 years 2 months ago
Reverse Engineering an Agent-Based Hidden Markov Model for Complex Social Systems
Hung-Ching Chen, Mark K. Goldberg, Malik Magdon-Is...