نتایج جستجو برای: reverse engineering approachstate cancer

تعداد نتایج: 1258278  

2017
Vinesh Raja

This chapter introduces readers to the term reverse engineering (RE), and to the associated techniques that can be used for scanning physical parts. In addition, the chapter presents the process of reverse engineering and the strategy for scanning and converting the scanned data into a 3-D surface or solid model.

2006
Ramakrishnan Ravindran

: Network security plays an increasingly important role in technology. As the world gets more and more interconnected, the need for security increases. While there are several tools that offer a fair amount of security, it is still crucial that students are educated well on the design and operation of malware, and learn to develop countermeasures that prevent malicious activity. To assist in th...

2006
David Mysicka Roger Wattenhofer

eMule is a popular peer-to-peer (p2p) client which builds upon the severbased eDonkey2000 (ed2k) platform. In newer versions of eMule, lookups can also be performed over the serverless Kad-network, an implementation of a distributed hash table (DHT) called Kademlia. Since only little is known about the techniques and algorithms used by eMule, this thesis presents an analysis of the implementati...

2010
Yusuf Arayici

Recently a great deal of research into construction IT has been completed, and this is ongoing to improve efficiency and quality in the construction sector. The new innovation of 3D laser scanning is aimed at being used to improve the efficiency and quality of construction projects, such as maintenance of buildings or group of buildings that are going to be renovated for new services. The 3D la...

2015

This chapter introduces readers to the term reverse engineering RE, and to the. Of obtaining a geometric CAD model from 3-D points acquired by scanning.Reverse engineering RE has many meanings to many different people. Automation of forward engineering through CAD and CAM technologies.exactly is reverse engineering particularly in the context of CAD CAM and how this can. One should know what is...

2012
Liliana Favre

The most known definition of reverse engineering was given by Chikofsky and Cross (1990): “the process of analyzing a subject system to (i) identify the system’s components and their interrelationships and (ii) create representations of the system in another form or at a higher-level of abstraction”. Reverse engineering is the process of discovering and understanding software artifacts or syste...

2003
Laurent Bouillon Jean Vanderdonckt

Reverse engineering transforms a final user interface into a logical representation that is manipulable enough to allow forward engineering to port a UI from one computing platform to another with maximum flexibility, minimal effort.

2003
Michele Lanza

The maintenance, reengineering, and evolution of object-oriented software systems has become a vital matter in today’s software industry. Although most systems start off in a clean and well-designed state, with time they tend to gradually decay in quality, unless the systems are reengineered and adapted to the evolving requirements. However, before such legacy software systems can be reengineer...

2009
Felix Domke

JTAG’s IEEE 1149.1 standard is a well-known method to access on-chip scan chains for testmode functionality. But a large part of the accessible test-modes are usually not documented. It will be shown that often these testmodes can be reverse-engineered by looking at the JTAG inputs and outputs. Undocumented test-modes can be pretty powerful tools in gaining “back door” access to a system.

2009
Jean-Luc Hainaut Jean Henrard Vincent Englebert Didier Roland Jean-Marc Hick

Database reverse engineering consists of recovering the abstract descriptions of files and databases of legacy information systems. A legacy information system can be defined as a “data-intensive application, such as [a] business system based on hundreds or thousands of data files (or tables), that significantly resists modifications and changes” (Brodie & Stonebraker, 1995). The objective of d...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید