Sciweavers

761 search results - page 22 / 153
» Reverse engineering MAC
Sort
View
WCRE
1999
IEEE
14 years 7 days ago
A Framework for Classifying and Comparing Software Reverse Engineering and Design Recovery Techniques
Several techniques have been suggested for supporting reverse engineering and design recovery activities. While many of these techniques have been cataloged in various collections...
Gerald C. Gannod, Betty H. C. Cheng
CHES
2009
Springer
248views Cryptology» more  CHES 2009»
14 years 8 months ago
The State-of-the-Art in IC Reverse Engineering
? This paper gives an overview of the place of reverse engineering (RE) in the semiconductor industry, and the techniques used to obtain information from semiconductor products. Th...
Randy Torrance, Dick James
CHI
2010
ACM
14 years 2 months ago
Prefab: implementing advanced behaviors using pixel-based reverse engineering of interface structure
Current chasms between applications implemented with different user interface toolkits make it difficult to implement and explore potentially important interaction techniques in n...
Morgan Dixon, James Fogarty
INFORMATICALT
2007
164views more  INFORMATICALT 2007»
13 years 7 months ago
Extracting Personalised Ontology from Data-Intensive Web Application: an HTML Forms-Based Reverse Engineering Approach
The advance of the Web has significantly and rapidly changed the way of information organization, sharing and distribution. The next generation of the web, the semantic web, seeks...
Sidi Mohamed Benslimane, Mimoun Malki, Mustapha Ka...
JDM
2008
112views more  JDM 2008»
13 years 7 months ago
Reverse Engineering from an XML Document into an Extended DTD Graph
The extensible markup language (XML) has become a standard for persistent storage and data interchange via the Internet due to its openness, self-descriptiveness, and flexibility....
Herbert Shiu, Joseph Fong