Sciweavers

7262 search results - page 66 / 1453
» Reversible Computer Hardware
Sort
View
DIMVA
2011
14 years 1 months ago
Reverse Social Engineering Attacks in Online Social Networks
Social networks are some of the largest and fastest growing online services today. Facebook, for example, has been ranked as the second most visited site on the Internet, and has b...
Danesh Irani, Marco Balduzzi, Davide Balzarotti, E...
ACSC
2004
IEEE
15 years 1 months ago
Java Implementation Verification Using Reverse Engineering
An approach to system verification is described in which design artefacts produced during forward engineering are automatically compared to corresponding artefacts produced during...
David J. A. Cooper, Benjamin Khoo, Brian R. von Ko...
SIGECOM
2011
ACM
320views ECommerce» more  SIGECOM 2011»
14 years 20 days ago
Market making and mean reversion
Market making refers broadly to trading strategies that seek to profit by providing liquidity to other traders, while avoiding accumulating a large net position in a stock. In th...
Tanmoy Chakraborty, Michael Kearns
NDSS
2008
IEEE
15 years 4 months ago
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution
Protocol reverse engineering has often been a manual process that is considered time-consuming, tedious and error-prone. To address this limitation, a number of solutions have rec...
Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, Xiangyu Zh...
DPPI
2007
ACM
15 years 1 months ago
Reverse alarm clock: a research through design example of designing for the self
This paper documents a first attempt at "designing for the self", an approach to designing products intended to help people move closer to their idealized sense of self a...
Kursat Kursat Ozenc, James P. Brommer, Bong-keum J...