نتایج جستجو برای: Reverse Engineering

تعداد نتایج: 364512  

Journal: :iranian journal of cancer prevention 0
pegah khosravi 1. dept. of bioinformatics, institute of biochemistry and biophysics (ibb), university of tehran, tehran, iran 2. school of biological sciences, institute for research in fundamental sciences (ipm), tehran, iran javad zahiri 1. faculty of mathematics, k. n. toosi university of technology, tehran, iran 2. dept. of bioinformatics, institute of biochemistry and biophysics (ibb), university of tehran, tehran, iran vahid h. gazestani institute of parasitology, mcgill university, montreal, quebec, canada samira mirkhalaf dept. of bioinformatics, institute of biochemistry and biophysics (ibb), university of tehran, tehran, iran mohammad akbarzadeh dept. of bioinformatics, institute of biochemistry and biophysics (ibb), university of tehran, tehran, iran mehdi sadeghi 1.national institute of genetic engineering and biotechnology, tehran, iran 2.school of biological sciences, institute for research in fundamental sciences (ipm), tehran, iran

background prostate cancer is a serious genetic disease known as the first widespread cancer in men, yet the molecular changes required for the cancer progression is not fully understood. availability of high-throughput gene expression data has led to the development of various computational methods for the identification of critical genes involved in the cancer. methods in this paper, we show ...

Journal: :Science of Computer Programming 2000

Journal: :international journal of advanced design and manufacturing technology 0
mohammadmahdi amiri research institute of petroleum industry (ripi),

nowadays cmm machines are widely used in surface measurement and inspection. as inspection results from cmm machine are obtained by the means of measuring surfaces with direct contact, they are more precise than non-contact method (like optical measurement). however, cmm machines give more reliable and accurate results rather than non-contact methods but also these results come with error when ...

Journal: :isecure, the isc international journal of information security 0
sh. zamanzadeh computer science and engineering department, shahid beheshti university, tehran, iran a. jahanian computer science and engineering department, shahid beheshti university, tehran, iran

fab-less business model in semiconductor industry has led to serious concerns about trustworthy hardware. in untrusted foundries and manufacturing companies, submitted layout may be analyzed and reverse engineered to steal the information of a design or insert malicious trojans. understanding the netlist topology is the ultimate goal of the reverse engineering process. in this paper, we propose...

Journal: :Annals of Pure and Applied Logic 2013

Journal: :INContext 2023

Ever since the establishment of Translation Studies as an independent academic discipline in 1970s, there has been ongoing debate about relationship between theory and practice, to which this paper aims make a modest practical contribution form novel procedure for textual analysis synthesis. Intellectual advances are often triggered by flashes inspiration suggest analogies that facilitate shift...

Journal: :Journal of Informatics, Information System, Software Engineering and Applications (INISTA) 2018

Journal: :Sci. Comput. Program. 1997
Ira D. Baxter Michael Mehlich

Reverse Engineering is focused on the challenging task of understanding legacy program code without having suitable documentation. Using a transformational forward engineering perspective, we gain the insight that much of this difficulty is caused by design decisions made during system development. Such decisions “hide” the program functionality and performance requirements in the final system ...

Journal: :Ann. Pure Appl. Logic 2013
Sam Sanders

An important open problem in Reverse Mathematics ([16, 25]) is the reduction of the first-order strength of the base theory from IΣ1 to I∆0 + exp. The system ERNA, a version of Nonstandard Analysis based on the system I∆0 + exp, provides a partial solution to this problem. Indeed, Weak König’s lemma and many of its equivalent formulations from Reverse Mathematics can be ‘pushed down’ into ERNA,...

2001
Spencer Rugaber Terry Shikano R. E. Kurt Stirewalt

Reverse engineering a program constructs a high-level representation suitable for various software development purposes such as documentation or reengineering. Unfortunately however, there are no established guidelines to assess the adequacy of such a representation. We propose two such criteria, completeness and accuracy, and show how they can be determined during the course of reversing the r...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید