Results 51 to 60 of about 4,446,471 (346)

Reverse Engineering Configurations of Neural Text Generation Models [PDF]

open access: yesAnnual Meeting of the Association for Computational Linguistics, 2020
Recent advances in neural text generation modeling have resulted in a number of societal concerns related to how such approaches might be used in malicious ways. It is therefore desirable to develop a deeper understanding of the fundamental properties of
Yi Tay   +5 more
semanticscholar   +1 more source

A novel nanoparticle vaccine, based on S1-CTD, elicits robust protective immune responses against porcine deltacoronavirus

open access: yesJournal of Virology
Porcine deltacoronavirus (PDCoV), an emerging swine pathogen causing severe enteric disease in piglets, poses cross-species transmission risks, including humans.
Qing He   +16 more
doaj   +1 more source

MODELS OF PROJECT REVERSE ENGINEERING

open access: yesВісник Національного технічного університету «ХПÌ». Серія: Стратегічне управління, управління портфелями, програмами та проектами, 2017
Reverse engineering decided important scientific and technical problems of increasing the cost of the existing technical product by transforming it into a product with other features or design.
Віктор Володимирович ІВАНОВ
doaj   +1 more source

(Critical) Reverse Engineering and Genealogy

open access: yesGenealogy+Critique, 2017
This paper articulates "critical reverse engineering" with Foucauldian genealogy. It first explores the theoretical bases for reverse engineering, drawing mainly on software engineering literature.
Robert W. Gehl
doaj   +2 more sources

The Role of Value Engineering & Reverse Engineering in Achieving Competitive Advantage An Exploratory Study

open access: yesمجلة الدراسات الاقتصادية والادارية, 2022
      The research aims to study value engineering and reverse engineering, which are strategic cost management tools in order to demonstrate their role in achieving the competitive advantage dimensions by reducing cost, improving quality, responding ...
Teacher Hatham Faleh Jigan
doaj   +1 more source

Reverse engineering small 4-manifolds

open access: yes, 2010
We introduce a general procedure called `reverse engineering' that can be used to construct infinite families of smooth 4-manifolds in a given homeomorphism type.
B Doug Park   +5 more
core   +1 more source

Penerapan Reverse Engineering Dalam Penentuan Pola Interaksi Sequence Diagram Pada Sampel Aplikasi Android

open access: yesJournal of Information Systems Engineering and Business Intelligence, 2015
Abstrak—Tujuan penelitian ini adalah penerapan reverse engineering untuk penentuan pola interaksi Sequence diagram yang bisa digunakan oleh sistem analis sebagai pola templateuntuk mendesain UML sequence diagram.
Vierdy Sulfianto Rahmadani   +2 more
doaj   +3 more sources

Model-Driven Reverse Engineering Approaches: A Systematic Literature Review

open access: yesIEEE Access, 2017
This paper explores and describes the state of the art for what concerns the model-driven approaches proposed in the literature to support reverse engineering.
Claudia Raibulet   +2 more
doaj   +1 more source

Behavioral effects of nonconscious mimicry and social intentions: A Reverse Engineered Pitch [PDF]

open access: yesContabilitate şi Informatică de Gestiune, 2018
Using the pitching research template elaborated by Faff (2017) as basis, this paper discusses the reverse engineering process on the article “Behavioural effects of nonconscious mimicry and social intentions” by Wong, Hartley and Tombs (2017).
Kerstin Klein
doaj   +1 more source

Honeypot-powered Malware Reverse Engineering

open access: yes, 2016
Honeypots, i.e. networked computer systems specially designed and crafted to mimic the normal operations of other systems while capturing and storing information about the interactions with the world outside, are a crucial technology into the study of ...
Bombardieri, Michele   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy