Sciweavers

684 search results - page 21 / 137
» Reverse Engineering CAPTCHAs
Sort
View
CHES
2009
Springer
248views Cryptology» more  CHES 2009»
15 years 10 months ago
The State-of-the-Art in IC Reverse Engineering
? This paper gives an overview of the place of reverse engineering (RE) in the semiconductor industry, and the techniques used to obtain information from semiconductor products. Th...
Randy Torrance, Dick James
CHI
2010
ACM
15 years 4 months ago
Prefab: implementing advanced behaviors using pixel-based reverse engineering of interface structure
Current chasms between applications implemented with different user interface toolkits make it difficult to implement and explore potentially important interaction techniques in n...
Morgan Dixon, James Fogarty
INFORMATICALT
2007
164views more  INFORMATICALT 2007»
14 years 9 months ago
Extracting Personalised Ontology from Data-Intensive Web Application: an HTML Forms-Based Reverse Engineering Approach
The advance of the Web has significantly and rapidly changed the way of information organization, sharing and distribution. The next generation of the web, the semantic web, seeks...
Sidi Mohamed Benslimane, Mimoun Malki, Mustapha Ka...
JDM
2008
112views more  JDM 2008»
14 years 9 months ago
Reverse Engineering from an XML Document into an Extended DTD Graph
The extensible markup language (XML) has become a standard for persistent storage and data interchange via the Internet due to its openness, self-descriptiveness, and flexibility....
Herbert Shiu, Joseph Fong
WSR
2008
14 years 11 months ago
Graph Technology in Reverse Engineering: The TGraph Approach
: TGraphs are directed graphs with typed, attributed, and ordered nodes and edges. These properties leverage the use of graphs as models for all kinds of artifacts in the context o...
Jürgen Ebert, Volker Riediger, Andreas Winter