Sciweavers

684 search results - page 31 / 137
» Reverse Engineering CAPTCHAs
Sort
View
KBSE
1997
IEEE
15 years 1 months ago
A Formal Automated Approach for Reverse Engineering Programs with Pointers
Given a program S and a precondition Q, the strongest postcondition, denoted sp(S Q), is defined as the strongest condition that holds after the execution of S, given that S term...
Gerald C. Gannod, Betty H. C. Cheng
FOSSACS
2006
Springer
15 years 1 months ago
Reversing Algebraic Process Calculi
Reversible computation has a growing number of promising application areas such as the modelling of biochemical systems, program debugging and testing, and even programming languag...
Iain C. C. Phillips, Irek Ulidowski
STACS
2009
Springer
15 years 4 months ago
Reverse Engineering Prefix Tables
The Prefix table of a string reports for each position the maximal length of its prefixes starting here. The Prefix table and its dual Suffix table are basic tools used in the d...
Julien Clément, Maxime Crochemore, Giuseppi...
INFOCOM
2007
IEEE
15 years 4 months ago
Reverse Engineering TCP/IP-Like Networks Using Delay-Sensitive Utility Functions
Abstract— TCP/IP can be interpreted as a distributed primaldual algorithm to maximize aggregate utility over source rates. It has recently been shown that an equilibrium of TCP/I...
John Pongsajapan, Steven H. Low
ECMDAFA
2007
Springer
100views Hardware» more  ECMDAFA 2007»
15 years 3 months ago
Reverse Engineering Models from Traces to Validate Distributed Systems - An Industrial Case Study
The paper targets the applicability of model-driven methodologies to the validation of complex systems and presents a case study of a mobile radio network. Validation relies on the...
Andreas Ulrich, Alexandre Petrenko