Sciweavers

761 search results - page 30 / 153
» Reverse engineering MAC
Sort
View
108
Voted
W4A
2006
ACM
15 years 7 months ago
Transforming web pages to become standard-compliant through reverse engineering
Developing Web pages following established standards can make the information more accessible, their rendering more efficient, and their processing by computer applications easier...
Benfeng Chen, Vincent Y. Shen
84
Voted
WCRE
1996
IEEE
15 years 6 months ago
On Designing an Experiment to Evaluate a Reverse Engineering Tool
Margaret-Anne D. Storey, Kenny Wong, P. Fong, D. H...
81
Voted
SEKE
1993
Springer
15 years 6 months ago
Reverse Engineering
Frank W. Calliss, Joseph Urban, James H. Cross II,...
VLSI
2010
Springer
14 years 11 months ago
Towards reverse engineering the brain: Modeling abstractions and simulation frameworks
Jayram Moorkanikara Nageswaran, Micah Richert, Nik...
126
Voted
ICC
2007
IEEE
100views Communications» more  ICC 2007»
15 years 8 months ago
S.T.R.E.S.S. : Stress Testing and Reverse Engineering for System Security
— In modern wireless networks the functions included into layer II have to deal with complex problems, such as security and access control, that were previously demanded to upper...
Matteo Rosi, Leonardo Maccari, Romano Fantacci