Sciweavers

5766 search results - page 85 / 1154
» Reverse Engineering of Data
Sort
View
MOBICOM
1999
ACM
15 years 2 months ago
Reversing the Collision-Avoidance Handshake in Wireless Networks
Many medium-access control (MAC) protocols for wireless networks proposed or implemented to date are based on collisionavoidance handshakes between sender and receiver. In the vas...
J. J. Garcia-Luna-Aceves, Asimakis Tzamaloukas
WCRE
2007
IEEE
15 years 4 months ago
Lossless Comparison of Nested Software Decompositions
Reverse engineering legacy software systems often involves the employment of clustering algorithms that automatically decompose a software system into subsystems. The decompositio...
Mark Shtern, Vassilios Tzerpos
WCRE
2003
IEEE
15 years 3 months ago
Completeness of a Fact Extractor
The process of software reverse engineering commonly uses an extractor, which parses source code and extracts facts about the code. The level of detail in these facts varies from ...
Yuan Lin, Richard C. Holt, Andrew J. Malton
KR
2004
Springer
15 years 3 months ago
Knowledge Discovery by Reversing Inductive Knowledge Representation
In a very basic sense, the aim of knowledge discovery is to reveal structures of knowledge which can be seen as being represented by structural relationships. In this paper, we ma...
Gabriele Kern-Isberner, Jens Fisseler
CORR
2010
Springer
144views Education» more  CORR 2010»
14 years 10 months ago
Algorithmic Verification of Single-Pass List Processing Programs
We introduce streaming data string transducers that map input data strings to output data strings in a single left-to-right pass in linear time. Data strings are (unbounded) seque...
Rajeev Alur, Pavol Cerný