Results 31 to 40 of about 4,446,471 (346)

Reverse engineering of metacognition

open access: yesbioRxiv, 2021
The human ability to introspect on thoughts, perceptions or actions − metacognitive ability − has become a focal topic of both cognitive basic and clinical research.
M. Guggenmos
semanticscholar   +1 more source

Reverse engineering of biochar [PDF]

open access: yes, 2015
This study underpins quantitative relationships that account for the combined effects that starting biomass and peak pyrolysis temperature have on physico-chemical properties of biochar.
Hanley, Kelly L.   +5 more
core   +6 more sources

On Manually Reverse Engineering Communication Protocols of Linux-Based IoT Systems [PDF]

open access: yesIEEE Internet of Things Journal, 2020
IoT security and privacy has raised grave concerns. Efforts have been made to design tools to identify and understand vulnerabilities of IoT systems.
Kaizheng Liu   +6 more
semanticscholar   +1 more source

A Reverse Modeling Method Based on CAD Model Prior and Surface Modeling

open access: yesMachines, 2022
Reverse engineering is an important process of real model digitization. However, the existing methods are limited by the characteristics of the modeling object; the modeling is low efficient, has poor versatility, and unstable accuracy.
Linlin Fan   +3 more
doaj   +1 more source

Reverse engineering is reverse forward engineering

open access: yesScience of Computer Programming, 2000
Reverse engineering is focused on the challenging task of understanding legacy program code without having suitable documentation. Using a transformational forward engineering perspective, we gain the insight that much of this difficulty is caused by design decisions made during system development.
Baxter, Ira D., Mehlich, Michael
openaire   +1 more source

Reverse Engineering Environment for Teaching Secure Coding in Java [PDF]

open access: yes, 2019
Few toolsets for program analysis and Java learning system provide an integrated console, debugger, and reverse engineered visualizer. We present an interactive debugging environment for Java which helps students to understand the secure coding by ...
Lee, Young, Yang, Jeong
core   +1 more source

Structure-Based Design of Porcine Circovirus Type 2 Chimeric VLPs (cVLPs) Displays Foreign Peptides on the Capsid Surface

open access: yesFrontiers in Cellular and Infection Microbiology, 2018
Although porcine circovirus-like particles can function as a vector to carry foreign peptides into host cells, displaying foreign peptides on the surface of virus-like particles (VLPs) remains challenging.
Dongliang Wang   +8 more
doaj   +1 more source

Reverse geometric engineering of singularities [PDF]

open access: yes, 2002
One can geometrically engineer supersymmetric field theories theories by placing D-branes at or near singularities. The opposite process is described, where one can reconstruct the singularities from quiver theories.
B. Feng   +18 more
core   +2 more sources

Mitochondrial Localization Signal of Porcine Circovirus Type 2 Capsid Protein Plays a Critical Role in Cap-Induced Apoptosis

open access: yesVeterinary Sciences, 2021
Porcine circovirus 2 (PCV2), considered one of the most globally important porcine pathogens, causes postweaning multisystemic wasting syndrome (PMWS). This virus is localized in the mitochondria in pigs with PMWS. Here, we identified, for the first time,
Wanting Yu   +9 more
doaj   +1 more source

Neural reverse engineering of stripped binaries using augmented control flow graphs

open access: yesProc. ACM Program. Lang., 2020
We address the problem of reverse engineering of stripped executables, which contain no debug information. This is a challenging problem because of the low amount of syntactic information available in stripped executables, and the diverse assembly code ...
Yaniv David, Uri Alon, Eran Yahav
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy