نتایج جستجو برای: reverse engineering approachstate cancer

تعداد نتایج: 1258278  

1993
Scott R. Tilley Hausi A. Müller Michael J. Whitney Kenny Wong

Any response to the software maintenance challenge must address the underlying problem of program understanding. One way of doing this is through reverse engineering. A successful approach to reverse engineering must be both exible and scalable. Most reverse engineering tools provide a xed palette of analysis, extraction, organization, representation, and selection techniques. This paper descri...

2015
Joseph Fong

As Extensible Markup Language (XML) (Bray, 2004) has become the standard document format, the chance that users have to deal with XML documents with different structures is increasing. If the schema of the XML documents in Document Type Definition (DTD) (Bosak, 1998) is given or derived from the XML documents right away (Kay, 1999; Moh, 2000), it is easier to study the contents of the XML docum...

2008
Aaron Portnoy Ali Rizvi-Santiago

Modern day programmers are increasingly making the switch from traditional compiled languages such as C and C++ to interpreted dynamic languages such as Ruby and Python. Interpreted languages are gaining popularity due to their flexibility, portability, and ease of development. However, these benefits are sometimes counterbalanced by new security exposures that developers are often unaware of. ...

2006
Jesse Thaler

In the presence of spontaneous symmetry breaking, the alignment of the vacuum with respect to the gauge group is often controlled by quadratically divergent operators in the low energy non-linear sigma model. In principle the magnitudes and signs of these operators can be changed by making different assumptions about the ultraviolet physics, but in practice all known ways of regulating these th...

2007
Srinivas Palthepu Gordon McCalla Jim Greer

Reverse engineering involves extracting high-level information from existing code. Reverse engineering is a crucial part of software maintenance since a maintainer needs to understand the code before attempting any modiication. Many eeorts have been made to automatically extract higher-level design information from the code to facilitate various maintenance activities. But many of them are limi...

2015
Pamela Samuelson Suzanne Scotchmer Rochelle Cooper Dreyfuss Joseph Farrell Neil Gandal Robert J. Glushko Wendy J. Gordon Mark A. Lemley

II. REVERSE ENGINEERING IN TRADITIONAL MANUFACTURING INDUSTRIES.....................................................................................1582 A. A Legal Perspective on Reverse Engineering ..........................1582 B. An Economic Perspective on Reverse Engineering .................1585 C. Anti-Plug-Mold Laws: An Exception to Reverse Engineering Rules?................................

Journal: :International Journal of Information Security 2019

Journal: :Proceedings of the National Academy of Sciences 2001

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید