Sciweavers

181 search results - page 32 / 37
» Reverse Engineering Method Stereotypes
Sort
View
BMCBI
2008
166views more  BMCBI 2008»
13 years 7 months ago
Learning transcriptional regulatory networks from high throughput gene expression data using continuous three-way mutual informa
Background: Probability based statistical learning methods such as mutual information and Bayesian networks have emerged as a major category of tools for reverse engineering mecha...
Weijun Luo, Kurt D. Hankenson, Peter J. Woolf
ACSC
2006
IEEE
14 years 1 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson
SIGADA
2005
Springer
14 years 29 days ago
Data sharing between ada and C/C++
The En Route Automation Modernization (ERAM) program is a real-time Air Traffic Control (ATC) program being developed by Lockheed Martin Corporation. The ERAM program has high ava...
Matt Mark
IRI
2003
IEEE
14 years 23 days ago
An Information Model of Virtual Collaboration
Distributed collaboration over the Internet has become increasingly common in recent years, supported by various technologies such as virtual workspace systems. Often such collabo...
Robert P. Biuk-Aghai
ESORICS
2008
Springer
13 years 9 months ago
Dismantling MIFARE Classic
The mifare Classic is a contactless smart card that is used extensively in access control for office buildings, payment systems for public transport, and other applications. We rev...
Flavio D. Garcia, Gerhard de Koning Gans, Ruben Mu...