Sciweavers

1542 search results - page 208 / 309
» Using Queries to Improve Database Reverse Engineering
Sort
View
DRM
2004
Springer
15 years 3 months ago
Attacks and risk analysis for hardware supported software copy protection systems
Recently, there is a growing interest in the research community to use tamper-resistant processors for software copy protection. Many of these tamper-resistant systems rely on a s...
Weidong Shi, Hsien-Hsin S. Lee, Chenghuai Lu, Tao ...
APPINF
2003
14 years 11 months ago
Extracting High-level Architecture from Existing Code with Summary Models
Evolution of existing large telecommunications software currently became an important issue. Efficient methods are needed to componentize existing software identify existing compo...
Nikolai Mansurov, Djenana Campara
CVGIP
2004
175views more  CVGIP 2004»
14 years 9 months ago
A subdivision-based deformable model for surface reconstruction of unknown topology
This paper presents a surface reconstruction algorithm that can recover correct shape geometry as well as its unknown topology from both volumetric images and unorganized point cl...
Ye Duan, Hong Qin
DEXAW
2000
IEEE
134views Database» more  DEXAW 2000»
15 years 2 months ago
"'Andreas Rauber'? Conference Pages Are over There, German Documents on the Lower Left, .." - An "Old-Fashioned" Approach to Web
With the massive advance of electronic document repositories, usable interfaces to these repositories gain importance. While sophisticated information retrieval techniques provide...
Andreas Rauber, Harald Bina
DKE
2010
101views more  DKE 2010»
14 years 10 months ago
Effective pruning for XML structural match queries
Extensible Markup Language (XML) is becoming the de facto standard for exchanging information over the Internet, which results in the proliferation of XML documents. This has led ...
Yefei Xin, Zhen He, Jinli Cao