Sciweavers

726 search results - page 33 / 146
» Reverse engineering: a roadmap
Sort
View
ESORICS
2009
Springer
16 years 2 months ago
ReFormat: Automatic Reverse Engineering of Encrypted Messages
Automatic protocol reverse engineering has recently received significant attention due to its importance to many security applications. However, previous methods are all limited in...
Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang,...
ER
2007
Springer
128views Database» more  ER 2007»
15 years 7 months ago
Dynamic Modeling of Trajectory Patterns using Data Mining and Reverse Engineering
The constant increase of moving object data imposes the need for modeling, processing, and mining trajectories, in order to find and understand the patterns behind these data. Ex...
Luis Otávio Alvares, Vania Bogorny, Jos&eac...
CW
2002
IEEE
15 years 6 months ago
Direct Segmentation for Reverse Engineering
In Reverse Engineering a physical object is digitally reconstructed from a set of boundary points. In the segmentation phase these points are grouped into subsets to facilitate co...
Marek Vanco, Guido Brunnett
CAD
2004
Springer
15 years 1 months ago
Local topological beautification of reverse engineered models
Boundary representation models reconstructed from 3D range data suffer from various inaccuracies caused by noise in the data and by numerical errors in the model building software...
C. H. Gao, Frank C. Langbein, A. David Marshall, R...
CAD
2004
Springer
15 years 1 months ago
Choosing consistent constraints for beautification of reverse engineered geometric models
Boundary representation models reconstructed from 3D range data suffer from various inaccuracies caused by noise in the data and the model building software. Such models can be im...
Frank C. Langbein, A. David Marshall, Ralph R. Mar...