A Reverse Engineering Approach

نویسنده

  • Joseph Fong
چکیده

As Extensible Markup Language (XML) (Bray, 2004) has become the standard document format, the chance that users have to deal with XML documents with different structures is increasing. If the schema of the XML documents in Document Type Definition (DTD) (Bosak, 1998) is given or derived from the XML documents right away (Kay, 1999; Moh, 2000), it is easier to study the contents of the XML documents. However, the formats of these schemas are hard to read, not to mention rather poor user-friendliness. XML has been the common format for storing and transferring data between software applications and even business parties, as most software applications can generate or handle XML documents. For example, a common scenario is that XML documents are generated and based on the data stored in a relational database ― and there have been AbstrAct

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Considering chain to chain competition in forward and reverse logistics of a dynamic and integrated supply chain network design problem

In this paper, a bi-objective model is presented for dynamic and integrated network design of a new entrant competitive closed-loop supply chain. To consider dynamism and integration in the network design problem, multiple long-term periods are regarded during planning horizon, so that each long-term period includes several short-term periods. Furthermore, a chain to chain competition between t...

متن کامل

Organization's performance measurement model based on the critical success factors of the reverse supply chain in airline industry with a quality gap approach

Airline industry is one of the main infrastructures for sustainable development of a country. The quality of the reverse support service will be effective in increasing the safety and health of the structures, reducing the impact of disasters and reducing costs. The aim of this study is to evaluate the performance of an organization based on the main factors of reverse supply chain with the ser...

متن کامل

A New Thermodynamic Approach for Protein Partitioning in Reverse Micellar Solution

Reverse micellar systems are nanofluids with unique properties that make them attractive in high selectivity separation processes, especially for biological compounds. Understanding the phase behavior and thermodynamic properties of these nanosystems is the first step in process design. Separation of components by these nanosystems is performed upon contact of aqueous and reverse micellar phase...

متن کامل

An Ant Colony approach to forward-reverse logistics network design under demand certainty

Forward-reverse logistics network has remained a subject of intensive research over the past few years. It is of significant importance to be issued in a supply chain because it affects responsiveness of supply chains. In real world, problems are needed to be formulated. These problems usually involve objectives such as cost, quality, and customers' responsiveness and so on. To this reason, we ...

متن کامل

Comprehensive Decision Modeling of Reverse Logistics System: A Multi-criteria Decision Making Model by using Hybrid Evidential Reasoning Approach and TOPSIS (TECHNICAL NOTE)

In the last two decades, product recovery systems have received increasing attention due to several reasons such as new governmental regulations and economic advantages. One of the most important activities of these systems is to assign returned products to suitable reverse manufacturing alternatives. Uncertainty of returned products in terms of quantity, quality, and time complicates the decis...

متن کامل

Reverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages

Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015