Sciweavers

761 search results - page 8 / 153
» Reverse engineering MAC
Sort
View
TACS
1991
Springer
13 years 10 months ago
An Abstract Interpretation for ML Equality Kinds
Carl A. Gunter, Elsa L. Gunter, David B. MacQueen
ICSE
1995
IEEE-ACM
13 years 10 months ago
Reverse Engineering of Legacy Code Exposed
— Reverse engineering of large legacy software systems generally cannot meet its objectives because it cannot be cost-effective. There are two main reasons for this. First, it is...
Bruce W. Weide, Wayne D. Heym, Joseph E. Hollingsw...
ICSE
2000
IEEE-ACM
13 years 10 months ago
Reverse engineering: a roadmap
By the early 1990s the need for reengineering legacy systems was already acute, but recently the demand has increased significantly with the shift toward web-based user interfaces...
Hausi A. Müller, Jens H. Jahnke, Dennis B. Sm...
WCRE
2008
IEEE
14 years 1 months ago
Reverse Engineering CAPTCHAs
CAPTCHAs are automated Turing tests used to determine if the end-user is human and not an automated program. Users are asked to read and answer Visual CAPTCHAs, which often appear...
Abram Hindle, Michael W. Godfrey, Richard C. Holt