Sciweavers

726 search results - page 53 / 146
» Reverse engineering: a roadmap
Sort
View
HCI
2007
13 years 11 months ago
Musculoskeletal and Performance Effects of Monocular Display Augmented, Articulated Arm Based Laser Digitizing
Abstract. Processes of capturing solid geometry features as threedimensional data for analysis, simulation, or reverse engineering require the use of laser-based reverse engineerin...
Neil Littell, Kari Babski-Reeves, Gary McFadyen, J...
NDSS
2008
IEEE
14 years 4 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
ACMSE
2006
ACM
14 years 4 months ago
Some new approaches for preventing software tampering
In this paper, we propose several methods to increase the difficulty of reverse engineering applications, with special emphasis on preventing the circumvention of copy protection ...
Bin Fu, Golden G. Richard III, Yixin Chen
SIGDOC
1995
ACM
14 years 1 months ago
Personalized information structures II: hyperstructure hotlists
This paper describes ongoing research into the use of a domain-retargetable reverse engineering environment to aid the structural understanding of large information spaces. In par...
Scott R. Tilley, Walter M. Lamia
ECEASST
2007
78views more  ECEASST 2007»
13 years 10 months ago
Lightweight Visualisations of COBOL Code for Supporting Migration to SOA
In this age of complex business landscapes, many enterprises turn to SOA for aligning their IT portfolio with their business. Because of the enormous business risk involved with r...
Joris Van Geet, Serge Demeyer