Sciweavers

726 search results - page 29 / 146
» Reverse engineering: a roadmap
Sort
View
HASE
2008
IEEE
15 years 8 months ago
A Grammar-Based Reverse Engineering Framework for Behavior Verification
A high assurance system requires both functional and nonfunctional correctness before the system is put into operation. To examine whether a system’s actual performance complies...
Chunying Zhao, Kang Zhang
ICDAR
2005
IEEE
15 years 7 months ago
Towards a Canonical and Structured Representation of PDF Documents through Reverse Engineering
This article presents Xed, a reverse engineering tool for PDF documents, which extracts the original document layout structure. Xed mixes electronic extraction methods with state-...
Maurizio Rigamonti, Jean-Luc Bloechle, Karim Hadja...
ESWS
2004
Springer
15 years 6 months ago
Reverse Engineering of Relational Databases to Ontologies
Abstract. We propose a novel approach to reverse engineering of relational databases to ontologies. Our approach is based on the idea that semantics of a relational database can be...
Irina Astrova
SMI
2003
IEEE
142views Image Analysis» more  SMI 2003»
15 years 6 months ago
Approximate Congruence Detection of Model Features for Reverse Engineering
Reverse engineering allows the geometric reconstruction of simple mechanical parts. However, the resulting models suffer from inaccuracies caused by errors in measurement and reco...
C. H. Gao, Frank C. Langbein, A. David Marshall, R...
INFOCOM
1996
IEEE
15 years 5 months ago
Network Security via Reverse Engineering of TCP Code: Vulnerability Analysis and Proposed Solutions
The Transmission Control Protocol Internet Protocol TCP IP 1 suite is a very widely used technique that is employed to interconnect computing facilities in modern network environm...
Biswaroop Guha, Biswanath Mukherjee