Sciweavers

677 search results - page 88 / 136
» Reverse Engineering
Sort
View
CORR
2010
Springer
64views Education» more  CORR 2010»
13 years 8 months ago
Near-Optimal Evasion of Convex-Inducing Classifiers
Classifiers are often used to detect miscreant activities. We study how an adversary can efficiently query a classifier to elicit information that allows the adversary to evade de...
Blaine Nelson, Benjamin I. P. Rubinstein, Ling Hua...
CAD
2007
Springer
13 years 7 months ago
Detection of closed sharp edges in point clouds using normal estimation and graph theory
The reconstruction of a surface model from a point cloud is an important task in the reverse engineering of industrial parts. We aim at constructing a curve network on the point c...
Kris Demarsin, Denis Vanderstraeten, Tim Volodine,...
JPDC
2006
83views more  JPDC 2006»
13 years 7 months ago
Virtual Leashing: Creating a computational foundation for software protection
We introduce Virtual Leashing,1 a new technique for software protection and control. The leashing process removes small fragments of code, pervasive throughout the application, an...
Ori Dvir, Maurice Herlihy, Nir Shavit
INFSOF
2007
185views more  INFSOF 2007»
13 years 7 months ago
Evaluation of object-oriented design patterns in game development
The use of object-oriented design patterns in game development is being evaluated in this paper. Games’ quick evolution, demands great flexibility, code reusability and low mai...
Apostolos Ampatzoglou, Alexander Chatzigeorgiou
JBI
2007
138views Bioinformatics» more  JBI 2007»
13 years 7 months ago
Towards knowledge-based gene expression data mining
ct 10 The field of gene expression data analysis has grown in the past few years from being purely data-centric to integrative, aiming at 11 complementing microarray analysis with...
Riccardo Bellazzi, Blaz Zupan