Sciweavers

5766 search results - page 23 / 1154
» Reverse Engineering of Data
Sort
View
WCRE
1999
IEEE
15 years 2 months ago
An Industrial Example of Database Reverse Engineering
This paper presents an industrial example of database reverse engineering. The example has been abridged so that it fits within a paper. Also some of the field names have been dis...
Michael R. Blaha
WCRE
2005
IEEE
15 years 3 months ago
Deobfuscation: Reverse Engineering Obfuscated Code
In recent years, code obfuscation has attracted attention as a low cost approach to improving software security by making it difficult for attackers to understand the inner worki...
Sharath K. Udupa, Saumya K. Debray, Matias Madou
INDIASE
2009
ACM
15 years 4 months ago
Computing dynamic clusters
When trying to reverse engineer software, execution trace analysis is increasingly used. Though, by using this technique we are quickly faced with an enormous amount of data that ...
Philippe Dugerdil, Sebastien Jossi
WCRE
2003
IEEE
15 years 3 months ago
An Experimentation Framework for Evaluating Disassembly and Decompilation Tools for C++ and Java
The inherent differences between C++ and Java programs dictate that the methods used for reverse engineering their compiled executables will be languagespecific. This paper looks ...
Lori Vinciguerra, Linda M. Wills, Nidhi Kejriwal, ...
JBI
2007
138views Bioinformatics» more  JBI 2007»
14 years 9 months ago
Towards knowledge-based gene expression data mining
ct 10 The field of gene expression data analysis has grown in the past few years from being purely data-centric to integrative, aiming at 11 complementing microarray analysis with...
Riccardo Bellazzi, Blaz Zupan