Sciweavers

2409 search results - page 37 / 482
» Reverse engineering the Internet
Sort
View
65
Voted
CAGD
1999
54views more  CAGD 1999»
15 years 9 days ago
Methods to recover constant radius rolling ball blends in reverse engineering
Géza Kós, Ralph R. Martin, Tam&aacut...
56
Voted
IBMSJ
1998
38views more  IBMSJ 1998»
15 years 9 days ago
Reverse Engineering of Data
Peter H. Aiken
59
Voted
SMR
1998
39views more  SMR 1998»
15 years 8 days ago
Model-based design of reverse engineering tools
Stan Jarzabek, Guosheng Wang
59
Voted
SMR
1998
45views more  SMR 1998»
15 years 8 days ago
An evaluation of reverse engineering tool capabilities
Berndt Bellay, Harald Gall
112
Voted
EMNLP
2009
14 years 10 months ago
Reverse Engineering of Tree Kernel Feature Spaces
We present a framework to extract the most important features (tree fragments) from a Tree Kernel (TK) space according to their importance in the target kernelbased machine, e.g. ...
Daniele Pighin, Alessandro Moschitti