Sciweavers

1542 search results - page 9 / 309
» Using Queries to Improve Database Reverse Engineering
Sort
View
WCRE
2005
IEEE
15 years 3 months ago
Deobfuscation: Reverse Engineering Obfuscated Code
In recent years, code obfuscation has attracted attention as a low cost approach to improving software security by making it difficult for attackers to understand the inner worki...
Sharath K. Udupa, Saumya K. Debray, Matias Madou
IJCAT
2010
80views more  IJCAT 2010»
14 years 6 months ago
Laser remanufacturing based on the integration of reverse engineering and laser cladding
: Laser remanufacturing has been used as an approach to refurbish or to improve the surface quality of high-priced parts. However, most of the existing systems lack measuring and m...
Liangliang Nan, Weijun Liu, Kai Zhang
SEKE
2007
Springer
15 years 3 months ago
REM4j - A Framework for Measuring the Reverse Engineering Capability of UML CASE Tools
Reverse Engineering is becoming increasingly important in the software development world today as many organizations are battling to understand and maintain old legacy systems. To...
Steven Kearney, James F. Power
ASWEC
2000
IEEE
15 years 2 months ago
ReVis: Reverse Engineering by Clustering and Visual Object Classification
This paper presents the framework of a scale-oriented scheme for the presentation and classification of reverse engineered sections of procedural code into objects. The aim is to ...
Aaron J. Quigley, Margot Postema, Heinz W. Schmidt
ICDE
2009
IEEE
155views Database» more  ICDE 2009»
15 years 4 months ago
SPROUT: Lazy vs. Eager Query Plans for Tuple-Independent Probabilistic Databases
— A paramount challenge in probabilistic databases is the scalable computation of confidences of tuples in query results. This paper introduces an efficient secondary-storage o...
Dan Olteanu, Jiewen Huang, Christoph Koch