Sciweavers

761 search results - page 28 / 153
» Reverse engineering MAC
Sort
View
WCRE
2005
IEEE
14 years 1 months ago
Enriching Reverse Engineering with Semantic Clustering
Understanding a software system by just analyzing the structure of the system reveals only half of the picture, since the structure tells us only how the code is working but not w...
Adrian Kuhn, Stéphane Ducasse, Tudor G&icir...
SAC
2004
ACM
14 years 1 months ago
WebUml: reverse engineering of web applications
Web applications have become complex and crucial for many firms, especially when combined with areas such as CRM (Customer Relationship Management) and BPR (Business Process Reen...
Carlo Bellettini, Alessandro Marchetto, Andrea Tre...
ICDE
1996
IEEE
120views Database» more  ICDE 1996»
14 years 9 months ago
Towards the Reverse Engineering of Denormalized Relational Databases
This paper describes a method to cope with denormalized relational schemas in a database reverse engineering process. We propose two main steps to irnprove the understanding of da...
Jean-Marc Petit, Farouk Toumani, Jean-Franç...
ESORICS
2009
Springer
14 years 8 months ago
ReFormat: Automatic Reverse Engineering of Encrypted Messages
Automatic protocol reverse engineering has recently received significant attention due to its importance to many security applications. However, previous methods are all limited in...
Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang,...
ER
2007
Springer
128views Database» more  ER 2007»
14 years 2 months ago
Dynamic Modeling of Trajectory Patterns using Data Mining and Reverse Engineering
The constant increase of moving object data imposes the need for modeling, processing, and mining trajectories, in order to find and understand the patterns behind these data. Ex...
Luis Otávio Alvares, Vania Bogorny, Jos&eac...