Sciweavers

5766 search results - page 26 / 1154
» Reverse Engineering of Data
Sort
View
WIOPT
2006
IEEE
15 years 3 months ago
Reverse engineering MAC
— This paper reverse-engineers backoff-based random-access MAC protocols in ad-hoc networks. We show that the contention resolution algorithm in such protocols is implicitly part...
Ao Tang, Jang-Won Lee, Jianwei Huang, Mung Chiang,...
CCS
2008
ACM
14 years 11 months ago
Tupni: automatic reverse engineering of input formats
Recent work has established the importance of automatic reverse engineering of protocol or file format specifications. However, the formats reverse engineered by previous tools ha...
Weidong Cui, Marcus Peinado, Karl Chen, Helen J. W...
WCRE
2006
IEEE
15 years 3 months ago
The Experimental Paradigm in Reverse Engineering: Role, Challenges, and Limitations
In many areas of software engineering, empirical studies are playing an increasingly important role. This stems from the fact that software technologies are often based on heurist...
Lionel C. Briand
ICSM
1994
IEEE
15 years 1 months ago
Domain-Retargetable Reverse Engineering II: Personalized User Interfaces
The user interface is an integral part of any application. This is especially true for reverse engineering environments, since the understanding process depends both on the user&#...
Scott R. Tilley
ASWEC
2005
IEEE
15 years 3 months ago
A Comparison of Reverse Engineering Tools Based on Design Pattern Decomposition
The usefulness of design patterns in forward engineering is already well-known and several tools provide support for their application in the development of software systems. Whil...
Francesca Arcelli Fontana, Stefano Masiero, Claudi...