Sciweavers

761 search results - page 41 / 153
» Reverse engineering MAC
Sort
View
COMSWARE
2007
IEEE
14 years 2 months ago
Leveraging MAC-layer information for single-hop wireless transport in the Cache and Forward Architecture of the Future Internet
— Cache and Forward (CNF) Architecture is a novel architecture aimed at delivering content efficiently to potentially large number of intermittently connected mobile hosts. It us...
Sumathi Gopal, Sanjoy Paul, Dipankar Raychaudhuri
ESORICS
2012
Springer
11 years 10 months ago
Dismantling iClass and iClass Elite
With more than 300 million cards sold, HID iClass is one of the most popular contactless smart cards on the market. It is widely used for access control, secure login and payment s...
Flavio D. Garcia, Gerhard de Koning Gans, Roel Ver...
ICDAR
2009
IEEE
13 years 5 months ago
OCD: An Optimized and Canonical Document Format
Revealing and being able to manipulate the structured content of PDF documents is a difficult task, requiring pre-processing and reverse engineering techniques. In this paper, we ...
Jean-Luc Bloechle, Denis Lalanne, Rolf Ingold
IUI
2004
ACM
14 years 1 months ago
Flexible re-engineering of web sites
Re-engineering transforms a final user interface into a logical representation that is manipulable enough to allow forward engineering to port a UI from one computing platform to ...
Laurent Bouillon, Jean Vanderdonckt, Kwok Chieu Ch...
INFORMATICALT
2002
110views more  INFORMATICALT 2002»
13 years 7 months ago
Extraction of Object-oriented Schemas from Existing Relational Databases: a Form-driven Approach
In this paper, we present our Form-driven approach for reverse engineering of relationa databases. This methodology uses the information extracted from both form structure and inst...
Mimoun Malki, André Flory, Mustapha Kamal R...