Sciweavers

761 search results - page 4 / 153
» Reverse engineering MAC
Sort
View
WCNC
2010
IEEE
13 years 11 months ago
ROPA: A MAC Protocol for Underwater Acoustic Networks with Reverse Opportunistic Packet Appending
—In most existing sender-initiated handshaking based underwater Media Access Control (MAC) protocols, only the initiating sender is allowed to transmit data packets to its intend...
Hai-Heng Ng, Wee-Seng Soh, Mehul Motani
ICSE
1995
IEEE-ACM
13 years 10 months ago
Reverse Engineering of Legacy Systems: A Path Toward Success
This paper addresses the question of whether the reverse engineering of legacy systems is doomed to failure. Our position is that the answer is highly dependent on the specific go...
Alex Quilici
WCRE
2003
IEEE
14 years 9 days ago
Fuzzy Extensions for Reverse Engineering Repository Models
Reverse Engineering is a process fraught with imperfections. The importance of dealing with non-precise, possibly inconsistent data explicitly when interacting with the reverse en...
Ulrike Kölsch, René Witte
IWPC
2008
IEEE
14 years 1 months ago
Re-Engineering a Reverse Engineering Portal to a Distributed SOA
REportal is an existing web-based reverse engineering portal web site that provides access to a suite of reverse engineering and program comprehension tools via a web This abstrac...
William M. Mongan, Maxim Shevertalov, Spiros Manco...
WCRE
1999
IEEE
13 years 11 months ago
Reusing Domains for the Construction of Reverse Engineering Tools
One of the challenges of reverse engineering is the extraction of a specification from source code. Our work proposes a singular approach to the construction of reverse engineerin...
Felipe Gouveia de Freitas, Julio Cesar Sampaio do ...