Sciweavers

2409 search results - page 98 / 482
» Reverse engineering the Internet
Sort
View
IASSE
2004
15 years 5 months ago
Design Pattern Recognition
The role of design patterns in forward engineering is well known, also if it's not easy to use them, since large experience is needed. Different approaches and tools have bee...
Francesca Arcelli Fontana, Claudia Raibulet, Franc...
PERCOM
2010
ACM
15 years 2 months ago
Architecture and protocols for the Internet of Things: A case study
—In this paper, we describe a practical realization of an Internet-of-Things (IoT) architecture at the University of Padova, Italy. Our network spans the floors of different bui...
Angelo Paolo Castellani, Nicola Bui, Paolo Casari,...
RIAO
2007
15 years 5 months ago
Image Retrieval Using a Multilingual Ontology
Search engines are among the most useful Internet applications. There exist several media types on the Web and, given the particularities of each of them, adapted search solutions...
Adrian Popescu
WCRE
2009
IEEE
15 years 11 months ago
Automatic Package Coupling and Cycle Minimization
Abstract—Object-oriented (OO) software is usually organized into subsystems using the concepts of package or module. Such modular structure helps applications to evolve when faci...
Hani Abdeen, Stéphane Ducasse, Houari A. Sa...
DRM
2005
Springer
15 years 10 months ago
Control flow based obfuscation
A software obfuscator is a program O to transform a source program P for protection against malicious reverse engineering. O should be correct (O(P) has same functionality with P)...
Jun Ge, Soma Chaudhuri, Akhilesh Tyagi