5,483 resources related to Reverse engineering
- Topics related to Reverse engineering
- IEEE Organizations related to Reverse engineering
- Conferences related to Reverse engineering
- Periodicals related to Reverse engineering
- Most published Xplore authors for Reverse engineering
2021 IEEE Photovoltaic Specialists Conference (PVSC)
Photovoltaic materials, devices, systems and related science and technology
The International Conference on Image Processing (ICIP), sponsored by the IEEE SignalProcessing Society, is the premier forum for the presentation of technological advances andresearch results in the fields of theoretical, experimental, and applied image and videoprocessing. ICIP 2020, the 27th in the series that has been held annually since 1994, bringstogether leading engineers and scientists in image and video processing from around the world.
The Annual IEEE PES General Meeting will bring together over 2900 attendees for technical sessions, administrative sessions, super sessions, poster sessions, student programs, awards ceremonies, committee meetings, tutorials and more
APEC focuses on the practical and applied aspects of the power electronics business. Not just a power designer’s conference, APEC has something of interest for anyone involved in power electronics including:- Equipment OEMs that use power supplies and converters in their equipment- Designers of power supplies, dc-dc converters, motor drives, uninterruptable power supplies, inverters and any other power electronic circuits, equipments and systems- Manufacturers and suppliers of components and assemblies used in power electronics- Manufacturing, quality and test engineers involved with power electronics equipment- Marketing, sales and anyone involved in the business of power electronic- Compliance engineers testing and qualifying power electronics equipment or equipment that uses power electronics
2019 IEEE International Symposium on Information Theory (ISIT)
Information theory and coding theory and their applications in communications and storage, data compression, wireless communications and networks, cryptography and security, information theory and statistics, detection and estimation, signal processing, big data analytics, pattern recognition and learning, compressive sensing and sparsity, complexity and computation theory, Shannon theory, quantum information and coding theory, emerging applications of information theory, information theory in biology.
The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...
Broad coverage of concepts and methods of the physical and engineering sciences applied in biology and medicine, ranging from formalized mathematical theory through experimental science and technological development to practical clinical applications.
Component parts, hybrid microelectronics, materials, packaging techniques, and manufacturing technology.
Specific topics of interest include, but are not limited to, sequence analysis, comparison and alignment methods; motif, gene and signal recognition; molecular evolution; phylogenetics and phylogenomics; determination or prediction of the structure of RNA and Protein in two and three dimensions; DNA twisting and folding; gene expression and gene regulatory networks; deduction of metabolic pathways; micro-array design and analysis; proteomics; ...
Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.
IEE Colloquium on Reverse Engineering for Software Based Systems, 1994
2012 19th Working Conference on Reverse Engineering, 2012
Almost all software contracts that are not open-source contain broad bans on reverse engineering, but as far as we can tell, almost all professional software development does reverse engineering to some degree. This is a fundamental, unresolved conflict. Every student and practitioner of software of engineering will face reverse engineering issues and they will have to make their own decisions ...
2008 15th Working Conference on Reverse Engineering, 2008
Analyzing SQL statements brings invaluable information that can be used in various applications such as program understanding and database reverse engineering. While static SQL statements are fairly easy to analyze, dynamic SQL statements most often require dynamic analysis techniques that may prove more difficult to implement. This paper addresses the problem of dynamic SQL query analysis in the context of ...
2008 15th Working Conference on Reverse Engineering, 2008
In this paper we present work in progress towards implementing a benchmark called BEFRIEND (benchmark for reverse engineering tools working on source code), with which the outputs of reverse engineering tools can be evaluated and compared easily and efficiently. Such tools are e.g. design pattern miners, duplicated code detectors and coding rule violation checkers. BEFRIEND supports different kinds of tool ...
2009 16th Working Conference on Reverse Engineering, 2009
Enterprise Applications are complex software systems that manipulate much persistent data and interact with the user through a vast and complex user interface. In particular applications written for the Java 2 Platform, Enterprise Edition (J2EE) are composed using various technologies such as Enterprise Java Beans (EJB) or Java Server Pages (JSP) that in turn rely on languages other than Java, ...
Micro-Apps 2013: Rapid Simulation of Large Phased Array T/R Module Networks
2014 Medal in Power Engineering
EMBC 2011-Symposium on BME Education-PT II
Lionel Briand on Software Engineering
EMBC 2011-Keynote Lecture-Engineering Drug Dosing in Dynamic Biological Systems - David J. Balaban
IMS 2015: Luca Pierantoni - A New Challenge in Computational Engineering
EMBC 2011-Symposium on BME Education-PT I
Enjoy the Ride: An Engineers Plan to Make Engineering Hip
IMS 2012 Special Sessions: A Retrospective of Field Theory in Microwave Engineering - David M. Pozar
IMS 2012 Special Sessions: Globalization of Engineering Education and Research: Opportunities and Challenges - John M. Grandin
I Change the World: Jessica's Inspiration
Engineering For Social Good
Engineering Workforce of the 21st Century: ISTAS 2019 Keynote by Babak D. Beheshti
IMS 2012 Special Sessions: Globalization of Engineering Education and Research: Opportunities and Challenges - Alan Cheville
IMS 2012 Special Sessions: Globalization of Engineering Education and Research: Opportunities and Challenges - Sigrid Berka
EMBC 2011-Workshop-Nanobiomaterials-Rohin K. Iyer
IMS 2012 Special Sessions: A Retrospective of Field Theory in Microwave Engineering - Magdalena Salazar Palma
IMS 2012 Special Sessions: Globalization of Engineering Education and Research: Opportunities and Challenges - Ron Hira
IMS 2012 Special Sessions: Globalization of Engineering Education and Research: Opportunities and Challenges - Peter Staecker
Almost all software contracts that are not open-source contain broad bans on reverse engineering, but as far as we can tell, almost all professional software development does reverse engineering to some degree. This is a fundamental, unresolved conflict. Every student and practitioner of software of engineering will face reverse engineering issues and they will have to make their own decisions about what is fair and reasonable in their situation, what risks they are willing to accept, and what corporate policies they should follow, support, or challenge. The industry is polarized and it will probably be a decade or more before the next generation of leadership revisits this conflict in a constructive way. For now, the statutes and the courts offer insufficient guidance. We plan to highlight the the issues of the law and reverse engineering through examples. Each exemplar case will be drawn either from an actual lawsuit or from a technical advance in reverse engineering. Rather than telling participants what to do, we will lay out the factors that we think they should consider.
Analyzing SQL statements brings invaluable information that can be used in various applications such as program understanding and database reverse engineering. While static SQL statements are fairly easy to analyze, dynamic SQL statements most often require dynamic analysis techniques that may prove more difficult to implement. This paper addresses the problem of dynamic SQL query analysis in the context of software and database reverse engineering. It explores the use of dynamic analysis techniques such as aspect-based tracing and SQL trace analysis for extracting implicit information about both the program behavior and the database structure.
In this paper we present work in progress towards implementing a benchmark called BEFRIEND (benchmark for reverse engineering tools working on source code), with which the outputs of reverse engineering tools can be evaluated and compared easily and efficiently. Such tools are e.g. design pattern miners, duplicated code detectors and coding rule violation checkers. BEFRIEND supports different kinds of tool families, programming languages and software systems, and it enables the users to define their own evaluation criteria.
Enterprise Applications are complex software systems that manipulate much persistent data and interact with the user through a vast and complex user interface. In particular applications written for the Java 2 Platform, Enterprise Edition (J2EE) are composed using various technologies such as Enterprise Java Beans (EJB) or Java Server Pages (JSP) that in turn rely on languages other than Java, such as XML or SQL. In this heterogeneous context applying existing reverse engineering and quality assurance techniques developed for object-oriented systems is not enough. Because those techniques have been created to measure quality or provide information about one aspect of J2EE applications, they cannot properly measure the quality of the entire system. We intend to devise techniques and metrics to measure quality in J2EE applications considering all their aspects and to aid their evolution. Using software visualization we also intend to inspect to structure of J2EE applications and all other aspects that can be investigate through this technique. In order to do that we also need to create a unified meta-model including all elements composing a J2EE application.
There is a real need for SOA principles, such as those offering software as services, in the software industry. In this effort, databases (one of the most important artifacts in information systems) can be also seen as a set of services offering access to the stored information. This paper presents PRECISO, a reverse engineering tool to discover and generate Web services automatically from relational databases. PRECISO makes it possible to modernize legacy databases by introducing them in an SOA context by means of the generated services. This tool was used in a real-life case study in the context of a software company.
Reverse engineering of executable code is a growing area of software engineering research and technology development due to a variety of reasons, including the porting of programs to newer and faster machines. In this paper we discuss three core object code reverse engineering technologies: emulation, decompilation, and binary translation, and present their uses in the last decades. These uses point at an economic need for such techniques to the benefit of users of the technology. We then present the extent of copyright protection for binary code and its implications on the development of binary code manipulation tools. Further, we argue that copyright laws should not hinder the development of computer and software technology at a time when hardware is developing at increasingly fast rates and software needs to be made available on such new machines; i.e. economic considerations need to be taken into account.
The maintenance of old but frequently used software systems remains a major problem for many organizations. Many COBOL programs, comprising billions of lines of code and developed many years ago, are in widespread use. These old programs need to be refashioned to take advantage of the latest operating system features, graphical user interfaces, databases, etc. Recreating these application programs from scratch is a laborious task. Reverse engineering tools may be used to extract the high level design and specification from such application programs thereby allowing them to be better understood and, consequently, making them easier to maintain and to update. However, if a software system is to undergo major refinement then its detailed low level design must be, extracted. Commercial reverse engineering tools produce low level designs which are difficult to understand and may require significant human interaction in order to perform the extraction.<<ETX>>
Data(base) reverse engineering is the process through which the missing technical and/or semantic schemas of a database (or, equivalently, of a set of files) are reconstructed. If carefully performed, this process allows legacy databases to be safely maintained, extended, migrated to modern platforms or merged with other, possibly heterogeneous, databases. Although this process is mostly pertinent for old databases, that are supposed to be poorly documented, it proves highly useful for recent databases as well, in as much as many of them are huge and complex, but poorly designed and insufficiently (if ever) documented. As compared to standard software reverse engineering, database reverse engineering exhibits some interesting particularities. Firstly, its very goal is to recover the complete specification of a database in such a way that its conversion to another data model could be automated, a ability that is, so far, not achievable for procedural code. Secondly, it makes use on a large variety on information sources, ranging from DDL (data definition language) code analysis to data analysis, program code analysis, program behaviour observation and ontology alignment. Finally, it quickly appears that database reverse engineering requires program understanding techniques, in the same way as serious data intensive program understanding requires database reverse engineering. Historically, we can identify three periods in DBRE: discovery, deepening and widening. They more or less correspond to the last three decades. The first period, the eighties, was mainly devoted to solving the problem of migrating CODASYL databases, IMS databases and standard files to relational technology. The techniques were based on automated DDL code interpretation augmented with some trivial heuristics to elicit undeclared constraints such as implicit foreign keys. Unfortunately, this approach proved insufficient to recover the complete database schemas, since it ignored the many implicit data structures and constraints which were implemented in the procedural code and in user interfaces for instance. The main objectives of the second period were to refine elicitation techniques to recover implicit constructs and to develop more flexible (semi-automated) methodologies to address the problem in all its complexity. In particular, sophisticated tool- based application code analysis and data analysis were designed in order to recover field and record structures, relationships, constraints and is-a hierarchies. In addition, the need for reverse engineering relational databases was admitted. In the present decade, the scope of data(base) reverse engineering and the supporting techniques are being considerably extended. The increasing consensus on XML as a data model, the view of the Web as an infinite database, the expression of data semantics through ontology technologies, the development of model-driven transformational models of engineering processes, the requirement of maintaining data traceability, the high cost of system (schemas + data + programs) migration, the explosion of web databases developed by unqualified developers, the increasing complexity and size of corporate databases, the need for heterogeneous database integration, the inescapable shortage of legacy database technology skills, the use of dynamic SQL in most web information systems (that makes popular program static analysis practically useless), the increasing use of ORM (object-relational mapping) environments that bury the database as a mere transparent persistence service, all are facts and trends that make data reverse engineering both more necessary and more complex by an order of magnitude. The future of data(base) reverse engineering is tied to its ability to address these challenges and to contribute to their solving. Conversely, the future of information system engineering seems, to a large extend, to be dependent on these solutions.
IC Reverse engineering is the process to analyze an integrated circuit to obtain information about its design, materials, logic circuitry, functionality, performance and other relevant features. The increasingly complexity of microchips using a greater number of layers and logic gates makes this process unaffordable when using traditional methods that rely on human inspection and analysis. Therefore, digital image processing is presented as a fruitful field for automation. In this paper a system for the circuitry extraction, analysis and presentation is described. It is divided in three blocks: 2D Image Tiling, Logic Gates Localization & Recognition and Microchip Navigator. The paper presents an overview of the complete system and is mainly based on the description of the image processing algorithms that are applied to the different blocks such as image stitching, customized Scale Invariant Feature Transform (SIFT) and logic gate localization & recognition.
This standard, IEEE 1284.3, defines system extensions consistent with the implementation and functionality of IEEE Std 1284. These functions include: Multi-port expansion architectures Multiplexor Daisy Chain Application and Device Driver Programming Interface architecture that can be supported across various operating systems. Data link layer services for supporting IEEE Std 1284 parallel ports.
Revision to incorporate both 1000V and 1200V maximum design voltage ratings. Review and revise as necessary the requirements for peak current design testing. Revise for metrification requirement.
This standard describes software designs and establishes the information content and organization of a software design description (SDD). An SDD is a representation of a software design to be used for recording design information and communicating that design information to key design stakeholders. This standard is intended for use in design situations in which an explicit software design description is ...
The scope of original document was: This standard covers electrical and mechanical performance and test requirements for load tap changers installed in power transformers and voltage regulating transformers of all voltage and kVA ratings. It relates mainly to load tap changers immersed in transformer mineral oil, but may also be used for other insulating fluids insofar as conditions are applicable. ...