Sciweavers

677 search results - page 8 / 136
» Reverse Engineering
Sort
View
CEC
2009
IEEE
14 years 2 months ago
Bio-inspired reverse engineering of regulatory networks
— Regulatory networks are complex networks. This paper addresses the challenge of modelling these networks. The Boolean representation is chosen and supported as a representation...
Cristina Costa Santini, Gunnar Tufte, Pauline C. H...
INFSOF
2007
81views more  INFSOF 2007»
13 years 7 months ago
An infrastructure to support interoperability in reverse engineering
An infrastructure is a set of interconnected structural elements, such as tools and schemas, that provide a framework for supporting an entire structure. The reverse engineering c...
Nicholas A. Kraft, Brian A. Malloy, James F. Power
WCRE
1999
IEEE
14 years 9 hour ago
An Industrial Example of Database Reverse Engineering
This paper presents an industrial example of database reverse engineering. The example has been abridged so that it fits within a paper. Also some of the field names have been dis...
Michael R. Blaha
WCRE
2003
IEEE
14 years 1 months ago
An Experimentation Framework for Evaluating Disassembly and Decompilation Tools for C++ and Java
The inherent differences between C++ and Java programs dictate that the methods used for reverse engineering their compiled executables will be languagespecific. This paper looks ...
Lori Vinciguerra, Linda M. Wills, Nidhi Kejriwal, ...
IEEEIAS
2007
IEEE
14 years 2 months ago
Metrics-based Evaluation of Slicing Obfuscations
An obfuscation aims to transform a program, without affecting its functionality, so that some secret data within the program can be hidden for as long as possible from an adversar...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...