نتایج جستجو برای: reverse engineering

تعداد نتایج: 364512  

Journal: :Bulletin of NTU "KhPI". Series: Strategic Management, Portfolio, Program and Project Management 2015

Journal: :Wiley Interdisciplinary Reviews: Systems Biology and Medicine 2012

Journal: :Proceedings of the National Academy of Sciences 2013

2000
Dave Swafford Diana Elman Peter Aiken Jeff Merhout

Better understanding manual reverse engineering can make it and any associated systems reengineering more effective. We reverse engineered a version of a system (referred to as "BOS/X") in support of a broader reengineering effort. System reengineering goals and other circumstances dictated a focused, limited duration, manual reverse engineering exercise. This presented an opportunity to study ...

2002
Chang-Xue Feng

Applications of reverse engineering to speeding up a product realization process have gained momentum in recent years. The Internet has found increasingly more applications in manufacturing. Internet-based reverse engineering takes advantage of the recent developments in the above two areas. This paper presents the methodology of Internet-based reverse engineering and a case study will illustra...

Journal: :IBM Systems Journal 1998
Peter H. Aiken

1998
Yih-Farn Chen

Java applets have been used increasingly on web sites to perform client-side processing and provide dynamic content. While many web site analysis tools are available , their focus has been on static HTML content and most ignore applet code completely. This paper presents a system that analyzes and tracks changes in Java ap-plets. The tool extracts information from applet code about classes, met...

2017
Vinesh Raja

This chapter introduces readers to the term reverse engineering (RE), and to the associated techniques that can be used for scanning physical parts. In addition, the chapter presents the process of reverse engineering and the strategy for scanning and converting the scanned data into a 3-D surface or solid model.

2006
Ramakrishnan Ravindran

: Network security plays an increasingly important role in technology. As the world gets more and more interconnected, the need for security increases. While there are several tools that offer a fair amount of security, it is still crucial that students are educated well on the design and operation of malware, and learn to develop countermeasures that prevent malicious activity. To assist in th...

2006
David Mysicka Roger Wattenhofer

eMule is a popular peer-to-peer (p2p) client which builds upon the severbased eDonkey2000 (ed2k) platform. In newer versions of eMule, lookups can also be performed over the serverless Kad-network, an implementation of a distributed hash table (DHT) called Kademlia. Since only little is known about the techniques and algorithms used by eMule, this thesis presents an analysis of the implementati...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید