Sciweavers

677 search results - page 43 / 136
» Reverse Engineering Super-Repositories
Sort
View
DAGSTUHL
2007
13 years 10 months ago
End-User Software Engineering Position Paper
bstract, rather than through examples. I’d like to see the ability to demonstrate examples in concrete situations, have the system record them, and generalize them to yield a pro...
Henry Lieberman
CCS
2008
ACM
13 years 11 months ago
Towards experimental evaluation of code obfuscation techniques
While many obfuscation schemes proposed, none of them satisfy any strong definition of obfuscation. Furthermore secure generalpurpose obfuscation algorithms have been proven to be...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...
CG
2006
Springer
13 years 9 months ago
Shape reasoning and understanding
s: clustering, denoising, sharp feature, shape abstraction, reverse engineering In this paper we describe a hierarchical face clustering algorithm for triangle meshes based on fit...
Bianca Falcidieno, Remco C. Veltkamp

Publication
295views
12 years 7 months ago
The Age of Analog Networks.
A large class of systems of biological and technological relevance can be described as analog networks, that is, collections of dynamic devices interconnected by links of varying s...
Claudio Mattiussi, Daniel Marbach, Peter Dürr, Da...
WCRE
1999
IEEE
14 years 1 months ago
Experiments with Clustering as a Software Remodularization Method
As valuable software systems get old, reverse engineering becomes more and more important to the companies that have to maintain the code. Clustering is a key activity in reverse ...
Nicolas Anquetil, Timothy Lethbridge