Sciweavers

677 search results - page 114 / 136
» Reverse Engineering is Reverse Forward Engineering
Sort
View
SMI
2007
IEEE
194views Image Analysis» more  SMI 2007»
15 years 4 months ago
Robust Smooth Feature Extraction from Point Clouds
Defining sharp features in a given 3D model facilitates a better understanding of the surface and aids visualizations, reverse engineering, filtering, simplification, non-photo...
Joel Daniels II, Linh K. Ha, Tilo Ochotta, Cl&aacu...
ACSC
2006
IEEE
15 years 3 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson
ISMAR
2005
IEEE
15 years 3 months ago
The Art of Nurturing Citizen Scientists through Mixed Reality
Modern society requires the public to have an increased knowledge of science beyond the basics, with average people needing to understand concepts in science, technology, engineer...
Christopher B. Stapleton, Eileen M. Smith, Charles...
SIGADA
2005
Springer
15 years 3 months ago
Data sharing between ada and C/C++
The En Route Automation Modernization (ERAM) program is a real-time Air Traffic Control (ATC) program being developed by Lockheed Martin Corporation. The ERAM program has high ava...
Matt Mark
DRM
2004
Springer
15 years 3 months ago
Attacks and risk analysis for hardware supported software copy protection systems
Recently, there is a growing interest in the research community to use tamper-resistant processors for software copy protection. Many of these tamper-resistant systems rely on a s...
Weidong Shi, Hsien-Hsin S. Lee, Chenghuai Lu, Tao ...