Sciweavers

682 search results - page 108 / 137
» Java Implementation Verification Using Reverse Engineering
Sort
View
SIGSOFT
2005
ACM
14 years 2 months ago
Detecting higher-level similarity patterns in programs
Cloning in software systems is known to create problems during software maintenance. Several techniques have been proposed to detect the same or similar code fragments in software...
Hamid Abdul Basit, Stan Jarzabek
OOPSLA
2005
Springer
14 years 2 months ago
Finding application errors and security flaws using PQL: a program query language
A number of effective error detection tools have been built in recent years to check if a program conforms to certain design rules. An important class of design rules deals with s...
Michael C. Martin, V. Benjamin Livshits, Monica S....
DRM
2004
Springer
14 years 2 months ago
Attacks and risk analysis for hardware supported software copy protection systems
Recently, there is a growing interest in the research community to use tamper-resistant processors for software copy protection. Many of these tamper-resistant systems rely on a s...
Weidong Shi, Hsien-Hsin S. Lee, Chenghuai Lu, Tao ...
CAGD
2002
102views more  CAGD 2002»
13 years 8 months ago
Optimal slicing of free-form surfaces
Many applications, such as contour machining, rapid prototyping, and reverse engineering by laser scanner or coordinate measuring machine, involve sampling of free-from surfaces a...
Tait S. Smith, Rida T. Farouki, Mohammad al-Kandar...
EUROMED
2010
13 years 7 months ago
3D Digitization and Its Applications in Cultural Heritage
Abstract. 3D digitizing technology has a variety of applications including reverse engineering, quality control, virtual reality and digital heritage. Recently, great development i...
Renju Li, Tao Luo, Hongbin Zha