Sciweavers

5766 search results - page 38 / 1154
» Reverse Engineering of Data
Sort
View
IWPC
2006
IEEE
15 years 9 months ago
Reverse Engineering Scripting Language Extensions
Software systems are often written in more than one programming language. During development, programmers need to understand not only the dependencies among code in a particular l...
Daniel L. Moise, Kenny Wong, H. James Hoover, Daqi...
142
Voted
KBSE
1997
IEEE
15 years 8 months ago
A Formal Automated Approach for Reverse Engineering Programs with Pointers
Given a program S and a precondition Q, the strongest postcondition, denoted sp(S Q), is defined as the strongest condition that holds after the execution of S, given that S term...
Gerald C. Gannod, Betty H. C. Cheng
124
Voted
FOSSACS
2006
Springer
15 years 7 months ago
Reversing Algebraic Process Calculi
Reversible computation has a growing number of promising application areas such as the modelling of biochemical systems, program debugging and testing, and even programming languag...
Iain C. C. Phillips, Irek Ulidowski
102
Voted
STACS
2009
Springer
15 years 10 months ago
Reverse Engineering Prefix Tables
The Prefix table of a string reports for each position the maximal length of its prefixes starting here. The Prefix table and its dual Suffix table are basic tools used in the d...
Julien Clément, Maxime Crochemore, Giuseppi...
106
Voted
INFOCOM
2007
IEEE
15 years 10 months ago
Reverse Engineering TCP/IP-Like Networks Using Delay-Sensitive Utility Functions
Abstract— TCP/IP can be interpreted as a distributed primaldual algorithm to maximize aggregate utility over source rates. It has recently been shown that an equilibrium of TCP/I...
John Pongsajapan, Steven H. Low