Sciweavers

761 search results - page 32 / 153
» Reverse engineering MAC
Sort
View
IWPC
2006
IEEE
14 years 2 months ago
Reverse Engineering Scripting Language Extensions
Software systems are often written in more than one programming language. During development, programmers need to understand not only the dependencies among code in a particular l...
Daniel L. Moise, Kenny Wong, H. James Hoover, Daqi...
KBSE
1997
IEEE
14 years 6 days ago
A Formal Automated Approach for Reverse Engineering Programs with Pointers
Given a program S and a precondition Q, the strongest postcondition, denoted sp(S Q), is defined as the strongest condition that holds after the execution of S, given that S term...
Gerald C. Gannod, Betty H. C. Cheng
FOSSACS
2006
Springer
13 years 11 months ago
Reversing Algebraic Process Calculi
Reversible computation has a growing number of promising application areas such as the modelling of biochemical systems, program debugging and testing, and even programming languag...
Iain C. C. Phillips, Irek Ulidowski
STACS
2009
Springer
14 years 2 months ago
Reverse Engineering Prefix Tables
The Prefix table of a string reports for each position the maximal length of its prefixes starting here. The Prefix table and its dual Suffix table are basic tools used in the d...
Julien Clément, Maxime Crochemore, Giuseppi...
INFOCOM
2007
IEEE
14 years 2 months ago
Reverse Engineering TCP/IP-Like Networks Using Delay-Sensitive Utility Functions
Abstract— TCP/IP can be interpreted as a distributed primaldual algorithm to maximize aggregate utility over source rates. It has recently been shown that an equilibrium of TCP/I...
John Pongsajapan, Steven H. Low