Sciweavers

684 search results - page 57 / 137
» Reverse Engineering CAPTCHAs
Sort
View
ASIACRYPT
2000
Springer
15 years 2 months ago
Power Analysis, What Is Now Possible...
Since Power Analysis on smart-cards was introduced by Paul Kocher [KJJ98], the validity of the model used for smart-cards has not been given much attention. In this paper, we firs...
Mehdi-Laurent Akkar, Régis Bevan, Paul Disc...
DEXAW
2009
IEEE
114views Database» more  DEXAW 2009»
15 years 1 months ago
A Meta-Framework for Generating Ontologies from Legacy Schemas
A huge amount of schemas are expressed within outdated schema languages which are restricted concerning expressiveness, extensibility, readability, and understandability. Consequen...
Manuel Wimmer
LOGCOM
2008
120views more  LOGCOM 2008»
14 years 9 months ago
Reconstructing an Agent's Epistemic State from Observations about its Beliefs and Non-beliefs
We look at the problem in belief revision of trying to make inferences about what an agent believed--or will believe--at a given moment, based on an observation of how the agent h...
Richard Booth, Alexander Nittka
CSMR
2000
IEEE
15 years 2 months ago
Analyzing Java Software by Combining Metrics and Program Visualization
Shimba, a prototype reverse engineering environment, has been built to support the understanding of Java software. Shimba uses Rigi and SCED to analyze, visualize, and explore the...
Tarja Systä, Ping Yu, Hausi A. Müller
SOFTVIS
2010
ACM
14 years 7 months ago
Dependence cluster visualization
Large clusters of mutual dependence have long been regarded as a problem impeding comprehension, testing, maintenance, and reverse engineering. An effective visualization can aid ...
Syed S. Islam, Jens Krinke, David Binkley