Sciweavers

761 search results - page 97 / 153
» Reverse engineering MAC
Sort
View
EC
2000
171views ECommerce» more  EC 2000»
13 years 7 months ago
Building Blocks, Cohort Genetic Algorithms, and Hyperplane-Defined Functions
Building blocks are a ubiquitous feature at all levels of human understanding, from perception through science and innovation. Genetic algorithms are designed to exploit this prev...
John H. Holland
MICCAI
2010
Springer
13 years 6 months ago
Automatic Detection of Anatomical Features on 3D Ear Impressions for Canonical Representation
Abstract. We propose a shape descriptor for 3D ear impressions, derived from a comprehensive set of anatomical features. Motivated by hearing aid (HA) manufacturing, the selection ...
Sajjad Baloch, Rupen Melkisetoglu, Simon Flör...
RAID
2010
Springer
13 years 6 months ago
Inferring Protocol State Machine from Real-World Trace
Application-level protocol specifications are helpful for network security management, including intrusion detection, intrusion prevention and detecting malicious code. However, c...
Yipeng Wang, Zhibin Zhang, Li Guo
SOFTVIS
2010
ACM
13 years 6 months ago
Visual comparison of software architectures
Reverse engineering methods produce different descriptions of software architectures. In this work we analyze and define the task of exploring and comparing these descriptions. ...
Fabian Beck, Stephan Diehl
FDTC
2010
Springer
124views Cryptology» more  FDTC 2010»
13 years 6 months ago
Optical Fault Masking Attacks
This paper introduces some new types of optical fault attacks called fault masking attacks. These attacks are aimed at disrupting of the normal memory operation through preventing ...
Sergei Skorobogatov