Sciweavers

376 search results - page 10 / 76
» General Reversibility
Sort
View
CCS
2008
ACM
13 years 10 months ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...
SIGSOFT
1994
ACM
14 years 20 days ago
A New Model of Program Dependences for Reverse Engineering
A dependence model for reverse engineering should treat procedures in a modular fashion and should be fine-grained, distinguishing dependences that are due to different variables....
Daniel Jackson, Eugene J. Rollins
BIOCOMP
2006
13 years 10 months ago
Reverse Engineering Approach in Molecular Evolution: Simulation and Case Study with Enzyme Proteins
- We developed a method of reverse engineering to compare the behaviour the enzyme proteins with the existing standard concepts. Our work is based on the strong assumption from the...
Sukanya Manna, Cheng-Yuan Liou
ICCAD
2007
IEEE
148views Hardware» more  ICCAD 2007»
14 years 5 months ago
Fast exact Toffoli network synthesis of reversible logic
— The research in the field of reversible logic is motivated by its application in low-power design, optical computing and quantum computing. Hence synthesis of reversible logic...
Robert Wille, Daniel Große
ICIP
2002
IEEE
14 years 10 months ago
Reversible data hiding
We present a novel reversible (lossless) data hiding (embedding) technique, which enables the exact recovery of the original host signal upon extraction of the embedded informatio...
Mehmet Utku Celik, Gaurav Sharma, Eli Saber, A. Mu...