Sciweavers

726 search results - page 126 / 146
» Reverse engineering: a roadmap
Sort
View
ACNS
2003
Springer
147views Cryptology» more  ACNS 2003»
14 years 3 months ago
Side-Channel Attack on Substitution Blocks
1 We describe a side-channel attack on a substitution block, which is usually implemented as a table lookup operation. In particular, we have investigated smartcard implementations...
Roman Novak
ER
2003
Springer
150views Database» more  ER 2003»
14 years 3 months ago
EITH - A Unifying Representation for Database Schema and Application Code in Enterprise Knowledge Extraction
The integration of heterogeneous legacy databases requires understanding of database structure and content. We previously developed a theoretical and software infrastructure to sup...
Mark S. Schmalz, Joachim Hammer, Mingxi Wu, Oguzha...
WSE
2002
IEEE
14 years 2 months ago
Dynamic Model Extraction and Statistical Analysis of Web Applications
The World Wide Web, initially intended as a way to publish static hypertexts on the Internet, is moving toward complex applications. Static Web sites are being gradually replaced ...
Paolo Tonella, Filippo Ricca
ICRA
2000
IEEE
136views Robotics» more  ICRA 2000»
14 years 2 months ago
Registration of Range Data Using a Hybrid Simulated Annealing and Iterative Closest Point Algorithm
The need to register data is abundant in applications such as: world modeling, part inspection and manufacturing, object recognition, pose estimation, robotic navigation, and reve...
Jason P. Luck, Charles Q. Little, William Hoff
TOOLS
1999
IEEE
14 years 2 months ago
A "Framework" for Object Oriented Frameworks Design
Object-oriented frameworks are an established tool for domain-specific reuse. Many framework design patterns and development processes have been documented, typically reverse engin...
David Parsons, Awais Rashid, Andreas Speck, Alexan...