Sciweavers

2409 search results - page 82 / 482
» Reverse engineering the Internet
Sort
View
INDIASE
2009
ACM
15 years 10 months ago
Computing dynamic clusters
When trying to reverse engineer software, execution trace analysis is increasingly used. Though, by using this technique we are quickly faced with an enormous amount of data that ...
Philippe Dugerdil, Sebastien Jossi
GECCO
2010
Springer
173views Optimization» more  GECCO 2010»
15 years 4 months ago
Superstate identification for state machines using search-based clustering
State machines are a popular method of representing a syshigh level of abstraction that enables developers to gain an overview of the system they represent and quickly understand ...
Mathew Hall, Phil McMinn, Neil Walkinshaw

Lecture Notes
889views
17 years 3 months ago
Future Directions in Computing
Silicon-based electronics is the foundation of computing devices. The computer industry is reaching an important milestone, where physical limits arising from using optical lithogr...
Sherief Reda
ICIAP
2007
ACM
15 years 10 months ago
A new and reliable Poisson noise estimator for radiographic images
Digital images in general, and radiographies in particular, are mainly affected by photon counting noise. In this paper, we provide a method to estimate the gain of the imaging se...
Iuri Frosio, Mirko Lucchese, N. Alberto Borghese
DRM
2003
Springer
15 years 9 months ago
Obfuscation of design intent in object-oriented applications
Protection of digital data from unauthorized access is of paramount importance. In the past several years, much research has concentrated on protecting data from the standpoint of...
Mikhail Sosonkin, Gleb Naumovich, Nasir D. Memon