نتایج جستجو برای: reverse engineering

تعداد نتایج: 364512  

Journal: :Proceedings of the National Academy of Sciences of the United States of America 2012
Marino Arroyo Luca Heltai Daniel Millán Antonio DeSimone

Euglenids exhibit an unconventional motility strategy amongst unicellular eukaryotes, consisting of large-amplitude highly concerted deformations of the entire body (euglenoid movement or metaboly). A plastic cell envelope called pellicle mediates these deformations. Unlike ciliary or flagellar motility, the biophysics of this mode is not well understood, including its efficiency and molecular ...

1995
W. W. Vermeer

This paper presents techniques for reverse engineering of re-lational database applications. The target of such an eeort is the deeni-tion of a fully equipped object-oriented view of the relational database, including methods and constraints. Such views can be seen as a full speci-cation of the database semantics, aiding for example in the identiication of semantic heterogeneity among interoper...

2008
Andrea Brühlmann Tudor Gîrba Orla Greevy Oscar Nierstrasz

Successful reverse engineering needs to take into account human knowledge about architecture, about features or even about validation of the results of automatic analyses. This knowledge should be linked to the automatically reverse engineered model and should be taken into account by analyses. Typically, when we want to reason about data, we first encode an explicit metamodel and then express ...

2005
Darren Mutz Christopher Kruegel William Robertson Giovanni Vigna Richard A. Kemmerer

Network-based intrusion detection systems analyze network traffic looking for evidence of attacks. The analysis is usually performed using signatures, which are rules that describe what traffic should be considered as malicious. If the signatures are known, it is possible to either craft an attack to avoid detection or to send synthetic traffic that will match the signature to over-stimulate th...

Journal: :CoRR 2017
Samah Mohamed Saeed Xiaotong Cui Robert Wille Alwin Zulehner Kaijie Wu Rolf Drechsler Ramesh Karri

Reversible logic has two main properties. First, the number of inputs is equal to the number of outputs. Second, it implements a one-to-one mapping; i.e., one can reconstruct the inputs from the outputs. These properties enable its applications in building quantum computing architectures. In this paper we study reverse engineering of reversible logic circuits, including reverse engineering of n...

Journal: :Annals of the New York Academy of Sciences 2007
B Stigler A Jarrah M Stillman R Laubenbacher

We consider the problem of reverse-engineering dynamic models of biochemical networks from experimental data using polynomial dynamic systems. In earlier work, we developed an algorithm to identify minimal wiring diagrams, that is, directed graphs that represent the causal relationships between network variables. Here we extend this algorithm to identify a most likely dynamic model from the set...

Journal: :Proceedings of the National Academy of Sciences of the United States of America 2013
Gert Cauwenberghs

One of the greatest aspirations of the human mind has been to realize machines that surpass its cognitive intelligence. The rapid expansion in computing power, about to exceed the equivalent of the human brain, has yet to produce such a machine. The article by Neftci et al. in PNAS (1) offers a refreshing and humbling reminder that the brain’s cognition does not arise from exacting digital prec...

Journal: :Computer Vision and Image Understanding 1995
Tarek M. Sobh Jonathan C. Owen Christopher O. Jaynes Mohamed Dekhil Thomas C. Henderson

We propose a new design for inspection and reverse engineering environments. We have designed and experimented with such an environinent for capturing sense data of niechaniccil parts in an intelligent way. We construct a sensing -+ CAD interface for the automatic recoiistruction of parts from visual data. We briefly discuss the use of the dynamic recursive finite state machine (DRFSM) as a new...

Journal: :Physics of life reviews 2005
Timothy S Gardner Jeremiah J Faith

Microarray technologies, which enable the simultaneous measurement of all RNA transcripts in a cell, have spawned the development of algorithms for reverse-engineering transcription control networks. In this article, we classify the algorithms into two general strategies: physical modeling and influence modeling. We discuss the biological and computational principles underlying each strategy, a...

2011
Mathieu Acher Anthony Cleve Philippe Collet Philippe Merle Laurence Duchien Philippe Lahire

Reverse engineering the variability of an existing system is a challenging activity. The architect knowledge is essential to identify variation points and explicit constraints between features, for instance in feature models (FMs), but the manual creation of FMs is both timeconsuming and error-prone. On a large scale, it is very difficult for an architect to guarantee that the resulting FM ensu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید