نتایج جستجو برای: reverse engineering approachstate cancer
تعداد نتایج: 1258278 فیلتر نتایج به سال:
Reverse Engineering is focused on the challenging task of understanding legacy program code without having suitable documentation. Using a transformational forward engineering perspective, the much of difficulty is caused by design decisions made during system development. Such decisions “hide” the program functionality and performance requirements in the final system by applying repeated refin...
This paper discusses the relevance and potential impact of both RFID and reverse engineering of RFID technology, followed by a discussion of common protocols and internals of RFID technology. The focus of the paper is on providing an overview of the different approaches to reverse engineering RFID technology and possible countermeasures that could limit the potential of such reverse engineering...
Java applets have been used increasingly on web sites to perform client-side processing and provide dynamic content. While many web site analysis tools are available, their focus has been on static HTML content and most ignore applet code completely. This paper presents a system that analyzes and tracks changes in Java applets. The tool extracts information from applet code about classes, metho...
Building systems from existing applications and mats and types. Different data formats and languages have data sources is common practice. Semi-structured data sources (such as XML, HTML, and databases) and programming languages (such as C# and Java) conform to welldefined, albeit different, type systems, each with their own unique underlying representations. As a consequence, reverse engineeri...
Database reverse engineering mainly deals with schema extraction, analysis and transformation. In the same way as for any other database engineering process, it must rely on a rich set of models. These models must be able to describe data structures at different levels of abstraction, ranging from physical to conceptual, and according to various modeling paradigms. In addition, statically descr...
Euglenids exhibit an unconventional motility strategy amongst unicellular eukaryotes, consisting of large-amplitude highly concerted deformations of the entire body (euglenoid movement or metaboly). A plastic cell envelope called pellicle mediates these deformations. Unlike ciliary or flagellar motility, the biophysics of this mode is not well understood, including its efficiency and molecular ...
This paper presents techniques for reverse engineering of re-lational database applications. The target of such an eeort is the deeni-tion of a fully equipped object-oriented view of the relational database, including methods and constraints. Such views can be seen as a full speci-cation of the database semantics, aiding for example in the identiication of semantic heterogeneity among interoper...
Successful reverse engineering needs to take into account human knowledge about architecture, about features or even about validation of the results of automatic analyses. This knowledge should be linked to the automatically reverse engineered model and should be taken into account by analyses. Typically, when we want to reason about data, we first encode an explicit metamodel and then express ...
Network-based intrusion detection systems analyze network traffic looking for evidence of attacks. The analysis is usually performed using signatures, which are rules that describe what traffic should be considered as malicious. If the signatures are known, it is possible to either craft an attack to avoid detection or to send synthetic traffic that will match the signature to over-stimulate th...
Reversible logic has two main properties. First, the number of inputs is equal to the number of outputs. Second, it implements a one-to-one mapping; i.e., one can reconstruct the inputs from the outputs. These properties enable its applications in building quantum computing architectures. In this paper we study reverse engineering of reversible logic circuits, including reverse engineering of n...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید