Sciweavers

761 search results - page 8 / 153
» Reverse engineering MAC
Sort
View
TACS
1991
Springer
15 years 3 months ago
An Abstract Interpretation for ML Equality Kinds
Carl A. Gunter, Elsa L. Gunter, David B. MacQueen
ICSE
1995
IEEE-ACM
15 years 3 months ago
Reverse Engineering of Legacy Code Exposed
— Reverse engineering of large legacy software systems generally cannot meet its objectives because it cannot be cost-effective. There are two main reasons for this. First, it is...
Bruce W. Weide, Wayne D. Heym, Joseph E. Hollingsw...
99
Voted
ICSE
2000
IEEE-ACM
15 years 3 months ago
Reverse engineering: a roadmap
By the early 1990s the need for reengineering legacy systems was already acute, but recently the demand has increased significantly with the shift toward web-based user interfaces...
Hausi A. Müller, Jens H. Jahnke, Dennis B. Sm...
WCRE
2008
IEEE
15 years 6 months ago
Reverse Engineering CAPTCHAs
CAPTCHAs are automated Turing tests used to determine if the end-user is human and not an automated program. Users are asked to read and answer Visual CAPTCHAs, which often appear...
Abram Hindle, Michael W. Godfrey, Richard C. Holt