Sciweavers

ICDAR
2009
IEEE
13 years 2 months ago
OCD: An Optimized and Canonical Document Format
Revealing and being able to manipulate the structured content of PDF documents is a difficult task, requiring pre-processing and reverse engineering techniques. In this paper, we ...
Jean-Luc Bloechle, Denis Lalanne, Rolf Ingold
SOFTVIS
2010
ACM
13 years 2 months ago
Dependence cluster visualization
Large clusters of mutual dependence have long been regarded as a problem impeding comprehension, testing, maintenance, and reverse engineering. An effective visualization can aid ...
Syed S. Islam, Jens Krinke, David Binkley
WCRE
2010
IEEE
13 years 3 months ago
Reverse Engineering Self-Modifying Code: Unpacker Extraction
—An important application of binary-level reverse engineering is in reconstructing the internal logic of computer malware. Most malware code is distributed in encrypted (or “pa...
Saumya K. Debray, Jay Patel
INFORMATICALT
2002
110views more  INFORMATICALT 2002»
13 years 4 months ago
Extraction of Object-oriented Schemas from Existing Relational Databases: a Form-driven Approach
In this paper, we present our Form-driven approach for reverse engineering of relationa databases. This methodology uses the information extracted from both form structure and inst...
Mimoun Malki, André Flory, Mustapha Kamal R...
ACTAC
2002
99views more  ACTAC 2002»
13 years 4 months ago
Recognizing Design Patterns in C++ Programs with the Integration of Columbus and Maisa
A method for recognizing design patterns from C++ programs is presented. The method consists of two separate phases, analysis and reverse engineering of the C++ code, and architec...
Rudolf Ferenc, Juha Gustafsson, Lászl&oacut...
BMCBI
2005
178views more  BMCBI 2005»
13 years 4 months ago
A quantization method based on threshold optimization for microarray short time series
Background: Reconstructing regulatory networks from gene expression profiles is a challenging problem of functional genomics. In microarray studies the number of samples is often ...
Barbara Di Camillo, Fatima Sanchez-Cabo, Gianna To...
INFSOF
2007
81views more  INFSOF 2007»
13 years 4 months ago
An infrastructure to support interoperability in reverse engineering
An infrastructure is a set of interconnected structural elements, such as tools and schemas, that provide a framework for supporting an entire structure. The reverse engineering c...
Nicholas A. Kraft, Brian A. Malloy, James F. Power
LOGCOM
2008
120views more  LOGCOM 2008»
13 years 5 months ago
Reconstructing an Agent's Epistemic State from Observations about its Beliefs and Non-beliefs
We look at the problem in belief revision of trying to make inferences about what an agent believed--or will believe--at a given moment, based on an observation of how the agent h...
Richard Booth, Alexander Nittka
CG
2006
Springer
13 years 5 months ago
Shape reasoning and understanding
s: clustering, denoising, sharp feature, shape abstraction, reverse engineering In this paper we describe a hierarchical face clustering algorithm for triangle meshes based on fit...
Bianca Falcidieno, Remco C. Veltkamp
BMCBI
2007
179views more  BMCBI 2007»
13 years 5 months ago
Automated smoother for the numerical decoupling of dynamics models
Background: Structure identification of dynamic models for complex biological systems is the cornerstone of their reverse engineering. Biochemical Systems Theory (BST) offers a pa...
Marco Vilela, Carlos Cristiano H. Borges, Susana V...