Results 221 to 230 of about 321,955 (260)
Some of the next articles are maybe not open access.

Reverse Engineering CAPTCHAs

2008 15th Working Conference on Reverse Engineering, 2008
CAPTCHAs are automated Turing tests used to determine if the end-user is human and not an automated program. Users are asked to read and answer Visual CAPTCHAs, which often appear as bitmaps of text characters, in order to gain access to a low-cost resource such as webmail or a blog.
Abram Hindle   +2 more
openaire   +1 more source

Adequate reverse engineering

Proceedings 16th Annual International Conference on Automated Software Engineering (ASE 2001), 2005
Reverse engineering a program constructs a high-level representation suitable for various software development purposes such as documentation or reengineering. Unfortunately however, there are no established guidelines to assess the adequacy of such a representation.
Spencer Rugaber   +2 more
openaire   +1 more source

Reverse Engineering Garments

2007
Segmenting garments from humanoid meshes or point clouds is a challenging problem with applications in the textile industry and in model based motion capturing. In this work we present a physically based template-matching technique for the automatic extraction of garment dimensions from 3D meshes or point clouds of dressed humans.
Nils Hasler   +2 more
openaire   +1 more source

Reverse engineering of data

IBM Systems Journal, 1998
Data reverse engineering (DRE) is a relatively new approach used to address a general category of data disintegration problems. DRE combines structured data analysis techniques with rigorous data management practices. The approach is growing in popularity as an integrative systems re-engineering method because of its ability to address multiple problem
openaire   +1 more source

Reverse Engineering in Industry

2013 20th Working Conference on Reverse Engineering (WCRE), 2013
This extended abstract gives a description of the panel “Reverse Engineering in Industry” which forms part of the 20th Working Conference on Reverse Engineering (WCRE 2013).
openaire   +1 more source

Reverse Engineering SPARQL Queries

Proceedings of the 25th International Conference on World Wide Web, 2016
Semantic Web systems provide open interfaces for end-users to access data via a powerful high-level query language, SPARQL. But users unfamiliar with either the details of SPARQL or properties of the target dataset may find it easier to query by example -- give examples of the information they want (or examples of both what they want and what they do ...
Marcelo Arenas   +2 more
openaire   +2 more sources

Teaching Software Engineering by Reverse Engineering

Computer Science Education, 1991
Teaching software engineering (SE) is a difficult but critical task, whether students are undergraduates, graduates, or professionals. Most designs of undergraduate courses are based on a large project. During this project, students apply methods that have been introduced during lectures.
openaire   +1 more source

Reverse Engineering for Software Performance Engineering

14th Working Conference on Reverse Engineering (WCRE 2007), 2007
Software reverse engineering can benefit from software performance engineering (SPE) techniques and vice versa. Reverse engineering's system artifacts satisfy SPE's need for a sequence of a software system in order to quantitatively analyze the system's performance characteristics.
openaire   +1 more source

Reverse engineering

ACM Inroads, 2012
William R. Mahoney, Robin A. Gandhi
openaire   +1 more source

Home - About - Disclaimer - Privacy