Sciweavers

677 search results - page 69 / 136
» Reverse Engineering is Reverse Forward Engineering
Sort
View
KDD
2005
ACM
158views Data Mining» more  KDD 2005»
16 years 8 days ago
Adversarial learning
Many classification tasks, such as spam filtering, intrusion detection, and terrorism detection, are complicated by an adversary who wishes to avoid detection. Previous work on ad...
Daniel Lowd, Christopher Meek
HOST
2008
IEEE
15 years 6 months ago
IC Activation and User Authentication for Security-Sensitive Systems
—A number of applications depend on the protection of security-sensitive hardware, preventing unauthorized users from gaining access to the functionality of the integrated circui...
Jiawei Huang, John Lach
WSE
2003
IEEE
15 years 5 months ago
Using Keyword Extraction for Web Site Clustering
Reverse engineering techniques have the potential to support Web site understanding, by providing views that show the organization of a site and its navigational structure. Howeve...
Paolo Tonella, Filippo Ricca, Emanuele Pianta, Chr...
FAST
2010
15 years 2 months ago
Write Endurance in Flash Drives: Measurements and Analysis
We examine the write endurance of USB flash drives using a range of approaches: chip-level measurements, reverse engineering, timing analysis, whole-device endurance testing, and ...
Simona Boboila, Peter Desnoyers
CAD
2008
Springer
14 years 12 months ago
Detecting approximate symmetries of discrete point subsets
Detecting approximate symmetries of parts of a model is important when attempting to determine the geometric design intent of approximate boundary-representation (B-rep) solid mod...
Ming Li, Frank C. Langbein, Ralph R. Martin