Sciweavers

5766 search results - page 7 / 1154
» Reverse Engineering of Data
Sort
View
WCRE
1999
IEEE
15 years 1 months ago
Chava: Reverse Engineering and Tracking of Java Applets
Java applets have been used increasingly on web sites to perform client-side processing and provide dynamic content. While many web site analysis tools are available, their focus ...
Jeffrey L. Korn, Yih-Farn Chen, Eleftherios Koutso...
ICSM
2002
IEEE
15 years 2 months ago
Columbus - Reverse Engineering Tool and Schema for C++
One of the most critical issues in large-scale software development and maintenance is the rapidly growing size and complexity of software systems. As a result of this rapid growt...
Rudolf Ferenc, Árpád Beszédes...
IEEEIAS
2007
IEEE
15 years 4 months ago
Metrics-based Evaluation of Slicing Obfuscations
An obfuscation aims to transform a program, without affecting its functionality, so that some secret data within the program can be hidden for as long as possible from an adversar...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
ESWS
2004
Springer
15 years 3 months ago
Reverse Engineering of Relational Databases to Ontologies
Abstract. We propose a novel approach to reverse engineering of relational databases to ontologies. Our approach is based on the idea that semantics of a relational database can be...
Irina Astrova
91
Voted
EMNLP
2009
14 years 7 months ago
Reverse Engineering of Tree Kernel Feature Spaces
We present a framework to extract the most important features (tree fragments) from a Tree Kernel (TK) space according to their importance in the target kernelbased machine, e.g. ...
Daniele Pighin, Alessandro Moschitti