Sciweavers

896 search results - page 59 / 180
» On completeness of word reversing
Sort
View
92
Voted
ICSE
2004
IEEE-ACM
16 years 25 days ago
Toward Undoing in Composite Web Services
Cancelling or reversing the effect of a former action is a necessity in most interactive systems. The simplest and most frequent form of this facility is the "undo" comma...
Marie-Claude Gaudel
80
Voted
ACSAC
2009
IEEE
15 years 7 months ago
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
Abstract—By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective counter...
Kyle Ingols, Matthew Chu, Richard Lippmann, Seth E...
142
Voted
WCRE
2008
IEEE
15 years 7 months ago
An Empirical Study of Function Clones in Open Source Software
The new hybrid clone detection tool NICAD combines the strengths and overcomes the limitations of both textbased and AST-based clone detection techniques to yield highly accurate ...
Chanchal Kumar Roy, James R. Cordy
102
Voted
CSMR
2007
IEEE
15 years 7 months ago
Example-Driven Reconstruction of Software Models
As software systems evolve, they become more complex and harder to understand and maintain. Certain reverse engineering techniques attempt to reconstruct software models from sour...
Oscar Nierstrasz, Markus Kobel, Tudor Gîrba,...
127
Voted
SMI
2007
IEEE
194views Image Analysis» more  SMI 2007»
15 years 7 months ago
Robust Smooth Feature Extraction from Point Clouds
Defining sharp features in a given 3D model facilitates a better understanding of the surface and aids visualizations, reverse engineering, filtering, simplification, non-photo...
Joel Daniels II, Linh K. Ha, Tilo Ochotta, Cl&aacu...