Sciweavers

684 search results - page 121 / 137
» Reverse Engineering CAPTCHAs
Sort
View
96
Voted
CORR
2008
Springer
120views Education» more  CORR 2008»
15 years 17 days ago
XQuery Join Graph Isolation
A purely relational account of the true XQuery semantics can turn any relational database system into an XQuery processor. Compiling nested expressions of the fully compositional X...
Torsten Grust, Manuel Mayr, Jan Rittinger
114
Voted
CAD
2006
Springer
15 years 16 days ago
Constrained 3D shape reconstruction using a combination of surface fitting and registration
We investigate 3D shape reconstruction from measurement data in the presence of constraints. The constraints may fix the surface type or set geometric relations between parts of a...
Yang Liu, Helmut Pottmann, Wenping Wang
JUCS
2006
92views more  JUCS 2006»
15 years 13 days ago
Program Slicing by Calculation
: Program slicing is a well known family of techniques used to identify code fragments which depend on or are depended upon specific program entities. They are particularly useful ...
Nuno F. Rodrigues, Luís Soares Barbosa
NAR
2006
84views more  NAR 2006»
15 years 12 days ago
Zinc Finger Tools: custom DNA-binding domains for transcription factors and nucleases
Individual zinc finger (ZF) domains that recognize DNA triplets with high specificity and affinity can be used to create designer transcription factors and nucleases that are spec...
Jeffrey G. Mandell, Carlos F. Barbas III
ISCI
2007
135views more  ISCI 2007»
15 years 11 days ago
Generalising the array split obfuscation
An obfuscation is a behaviour-preserving program transformation whose aim is to make a program “harder to understand”. Obfuscations are mainly applied to make reverse engineer...
Stephen Drape