Sciweavers

684 search results - page 92 / 137
» Reverse Engineering CAPTCHAs
Sort
View
ACTAC
2002
102views more  ACTAC 2002»
14 years 9 months ago
Handling Pointers and Unstructured Statements in the Forward Computed Dynamic Slice Algorithm
Different program slicing methods are used for debugging, testing, reverse engineering and maintenance. Slicing algorithms can be classified as a static slicing or dynamic slicing...
Csaba Faragó, Tamás Gergely
EC
2000
171views ECommerce» more  EC 2000»
14 years 9 months ago
Building Blocks, Cohort Genetic Algorithms, and Hyperplane-Defined Functions
Building blocks are a ubiquitous feature at all levels of human understanding, from perception through science and innovation. Genetic algorithms are designed to exploit this prev...
John H. Holland
MICCAI
2010
Springer
14 years 8 months ago
Automatic Detection of Anatomical Features on 3D Ear Impressions for Canonical Representation
Abstract. We propose a shape descriptor for 3D ear impressions, derived from a comprehensive set of anatomical features. Motivated by hearing aid (HA) manufacturing, the selection ...
Sajjad Baloch, Rupen Melkisetoglu, Simon Flör...
RAID
2010
Springer
14 years 8 months ago
Inferring Protocol State Machine from Real-World Trace
Application-level protocol specifications are helpful for network security management, including intrusion detection, intrusion prevention and detecting malicious code. However, c...
Yipeng Wang, Zhibin Zhang, Li Guo
SOFTVIS
2010
ACM
14 years 8 months ago
Visual comparison of software architectures
Reverse engineering methods produce different descriptions of software architectures. In this work we analyze and define the task of exploring and comparing these descriptions. ...
Fabian Beck, Stephan Diehl