Sciweavers

761 search results - page 129 / 153
» Reverse engineering MAC
Sort
View
CORR
2008
Springer
120views Education» more  CORR 2008»
13 years 8 months ago
XQuery Join Graph Isolation
A purely relational account of the true XQuery semantics can turn any relational database system into an XQuery processor. Compiling nested expressions of the fully compositional X...
Torsten Grust, Manuel Mayr, Jan Rittinger
CAD
2006
Springer
13 years 8 months ago
Constrained 3D shape reconstruction using a combination of surface fitting and registration
We investigate 3D shape reconstruction from measurement data in the presence of constraints. The constraints may fix the surface type or set geometric relations between parts of a...
Yang Liu, Helmut Pottmann, Wenping Wang
JUCS
2006
92views more  JUCS 2006»
13 years 8 months ago
Program Slicing by Calculation
: Program slicing is a well known family of techniques used to identify code fragments which depend on or are depended upon specific program entities. They are particularly useful ...
Nuno F. Rodrigues, Luís Soares Barbosa
NAR
2006
84views more  NAR 2006»
13 years 8 months ago
Zinc Finger Tools: custom DNA-binding domains for transcription factors and nucleases
Individual zinc finger (ZF) domains that recognize DNA triplets with high specificity and affinity can be used to create designer transcription factors and nucleases that are spec...
Jeffrey G. Mandell, Carlos F. Barbas III
ISCI
2007
135views more  ISCI 2007»
13 years 7 months ago
Generalising the array split obfuscation
An obfuscation is a behaviour-preserving program transformation whose aim is to make a program “harder to understand”. Obfuscations are mainly applied to make reverse engineer...
Stephen Drape