نتایج جستجو برای: reverse engineering approach

تعداد نتایج: 1595602  

2017
Vinesh Raja

This chapter introduces readers to the term reverse engineering (RE), and to the associated techniques that can be used for scanning physical parts. In addition, the chapter presents the process of reverse engineering and the strategy for scanning and converting the scanned data into a 3-D surface or solid model.

2006
Ramakrishnan Ravindran

: Network security plays an increasingly important role in technology. As the world gets more and more interconnected, the need for security increases. While there are several tools that offer a fair amount of security, it is still crucial that students are educated well on the design and operation of malware, and learn to develop countermeasures that prevent malicious activity. To assist in th...

2006
David Mysicka Roger Wattenhofer

eMule is a popular peer-to-peer (p2p) client which builds upon the severbased eDonkey2000 (ed2k) platform. In newer versions of eMule, lookups can also be performed over the serverless Kad-network, an implementation of a distributed hash table (DHT) called Kademlia. Since only little is known about the techniques and algorithms used by eMule, this thesis presents an analysis of the implementati...

2010
Yusuf Arayici

Recently a great deal of research into construction IT has been completed, and this is ongoing to improve efficiency and quality in the construction sector. The new innovation of 3D laser scanning is aimed at being used to improve the efficiency and quality of construction projects, such as maintenance of buildings or group of buildings that are going to be renovated for new services. The 3D la...

2015

This chapter introduces readers to the term reverse engineering RE, and to the. Of obtaining a geometric CAD model from 3-D points acquired by scanning.Reverse engineering RE has many meanings to many different people. Automation of forward engineering through CAD and CAM technologies.exactly is reverse engineering particularly in the context of CAD CAM and how this can. One should know what is...

Journal: :Journal of Software Maintenance 1998
Stan Jarzabek Guosheng Wang

Tools built in an ad hoc way and without proper models often display problems for both tool users and designers. Firstly, without systematic analysis and good understanding of the underlying software process model, we have little chance to design a tool that will adequately address user’s needs. Next, because one tool is often used in many different situations and by people who have different w...

2012
Liliana Favre

The most known definition of reverse engineering was given by Chikofsky and Cross (1990): “the process of analyzing a subject system to (i) identify the system’s components and their interrelationships and (ii) create representations of the system in another form or at a higher-level of abstraction”. Reverse engineering is the process of discovering and understanding software artifacts or syste...

2003
Laurent Bouillon Jean Vanderdonckt

Reverse engineering transforms a final user interface into a logical representation that is manipulable enough to allow forward engineering to port a UI from one computing platform to another with maximum flexibility, minimal effort.

2003
Michele Lanza

The maintenance, reengineering, and evolution of object-oriented software systems has become a vital matter in today’s software industry. Although most systems start off in a clean and well-designed state, with time they tend to gradually decay in quality, unless the systems are reengineered and adapted to the evolving requirements. However, before such legacy software systems can be reengineer...

2009
Felix Domke

JTAG’s IEEE 1149.1 standard is a well-known method to access on-chip scan chains for testmode functionality. But a large part of the accessible test-modes are usually not documented. It will be shown that often these testmodes can be reverse-engineered by looking at the JTAG inputs and outputs. Undocumented test-modes can be pretty powerful tools in gaining “back door” access to a system.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید