Sciweavers

761 search results - page 75 / 153
» Reverse engineering MAC
Sort
View
MICRO
2002
IEEE
97views Hardware» more  MICRO 2002»
14 years 1 months ago
Three extensions to register integration
Register integration (or just integration) is a register renaming discipline that implements instruction reuse via physical register sharing. Initially developed to perform squash...
Vlad Petric, Anne Bracy, Amir Roth
ICDAR
2007
IEEE
14 years 2 months ago
XML Data Representation in Document Image Analysis
This paper presents the XML-based formats ALTO, TEI, METS used for Digital Libraries and their interest for data representation in a Document Image Analysis and Recognition (DIAR)...
Abdel Belaïd, Yves Rangoni, I. Falk
SIGADA
2005
Springer
14 years 1 months ago
Using ASIS to generate C++ bindings
In this paper, we describe an approach to automatically creating C++ bindings to Ada libraries utilizing capabilities of the Ada Semantic Interface Specification (ASIS). We discus...
Howard Ausden, Karl A. Nyberg
SEC
2007
13 years 9 months ago
FirePatch: Secure and Time-Critical Dissemination of Software Patches
Because software security patches contain information about vulnerabilities, they can be reverse engineered into exploits. Tools for doing this already exist. As a result, there is...
Håvard D. Johansen, Dag Johansen, Robbert va...
FMOODS
2006
13 years 9 months ago
Modeling and Validation of a Software Architecture for the Ariane-5 Launcher
We present the modeling and validation experiments performed with the IFx validation toolset and with the UML profile developed within the IST Omega project, on a representative sp...
Iulian Ober, Susanne Graf, David Lesens