Results 41 to 50 of about 4,446,471 (346)
Reverse engineering the Milky Way [PDF]
The ages, metallicities, alpha-elements, and integrals of motion of globular clusters (GCs) accreted by the Milky Way from disrupted satellites remain largely unchanged over time. Here we have used these conserved properties in combination to assign 76
D. Forbes
semanticscholar +1 more source
On Reverse Engineering in the Cognitive and Brain Sciences [PDF]
Various research initiatives try to utilize the operational principles of organisms and brains to develop alternative, biologically inspired computing paradigms and artificial cognitive systems.
Schierwagen, Andreas
core +2 more sources
Non-muscle Myosin II: Role in Microbial Infection and Its Potential as a Therapeutic Target
Currently, the major measures of preventing and controlling microbial infection are vaccinations and drugs. However, the appearance of drug resistance microbial mounts is main obstacle in current anti-microbial therapy.
Lei Tan +5 more
doaj +1 more source
A Novel Design Process Model for Manufacturing Based on Reverse Engineering
Engineering can be classified into two groups as forward engineering (FE) and reverse engineering (RE). Forward engineering method progress from the definition of the problem to evaluation, test, and optimization of the solution.
Tamer TÜRKÜCÜ, H. Rıza BÖRKLÜ
doaj +1 more source
Reverse engineering to achieve maintainable WWW sites [PDF]
The growth of the World Wide Web and the accelerated development of web sites and associated web technologies has resulted in a variety of maintenance problems. The maintenance problems associated with web sites and the WWW are examined.
Boldyreff, Cornelia, Kewish, Richard
core +3 more sources
Protecting molecular structures from disclosure against external parties is of great relevance for industrial and private associations, such as pharmaceutical companies.
Tuan Le +3 more
semanticscholar +1 more source
The Indonesian Trade Secrets Law Number 30/2000 (ITS Law) postulates exemptions for acts that are not considered infringements to protect trade secrets. One of them is the reverse engineering of other people’s trade secrets.
Faizal Kurniawan +2 more
doaj +1 more source
On the Reverse Engineering of the Citadel Botnet [PDF]
Citadel is an advanced information-stealing malware which targets financial information. This malware poses a real threat against the confidentiality and integrity of personal and business data. A joint operation was recently conducted by the FBI and the
A Rahimian +4 more
core +3 more sources
Reverse Engineering in Orthodontics
Three-dimensional (3D) imaging has advanced greatly and is used extensively in orthodontics. It is worth outlining and reviewing the developments of reverse engineering (RE) as its applications are growing more widespread and diverse.
Hajra Ghafoor
doaj +1 more source
PROJECT MANAGEMENT OF REVERSE ENGINEERING
It is extended the concept of reverse engineering and invited its division into three classes of problems: conceptual, aggregate and complete. The analysis of the composition of the project team, the hardware, software and heuristic methods are used in ...
Виктор Владимирович ИВАНОВ
doaj +1 more source

