Sciweavers

677 search results - page 41 / 136
» Reverse Engineering Super-Repositories
Sort
View
STACS
2009
Springer
14 years 3 months ago
Reverse Engineering Prefix Tables
The Prefix table of a string reports for each position the maximal length of its prefixes starting here. The Prefix table and its dual Suffix table are basic tools used in the d...
Julien Clément, Maxime Crochemore, Giuseppi...
INFOCOM
2007
IEEE
14 years 3 months ago
Reverse Engineering TCP/IP-Like Networks Using Delay-Sensitive Utility Functions
Abstract— TCP/IP can be interpreted as a distributed primaldual algorithm to maximize aggregate utility over source rates. It has recently been shown that an equilibrium of TCP/I...
John Pongsajapan, Steven H. Low
ECMDAFA
2007
Springer
100views Hardware» more  ECMDAFA 2007»
14 years 3 months ago
Reverse Engineering Models from Traces to Validate Distributed Systems - An Industrial Case Study
The paper targets the applicability of model-driven methodologies to the validation of complex systems and presents a case study of a mobile radio network. Validation relies on the...
Andreas Ulrich, Alexandre Petrenko
IDEAL
2007
Springer
14 years 3 months ago
Reverse Engineering an Agent-Based Hidden Markov Model for Complex Social Systems
Hung-Ching Chen, Mark K. Goldberg, Malik Magdon-Is...
CRV
2006
IEEE
99views Robotics» more  CRV 2006»
14 years 3 months ago
The Nomad 200 and the Nomad SuperScout: Reverse engineered and resurrected
The Nomad 200 and the Nomad SuperScouts are among the most popular platforms used, for research in robotics. Built in the early 1990’s they were the base of choice for many mobil...
Arjun Chopra, Mark Obsniuk, Michael R. M. Jenkin