Academic literature on the topic 'Barrier to reverse engineer'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Barrier to reverse engineer.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Barrier to reverse engineer"
Wildum, Steffen, Daniela Paulsen, Kai Thede, Helga Ruebsamen-Schaeff, and Holger Zimmermann. "In VitroandIn VivoActivities of AIC292, a Novel HIV-1 Nonnucleoside Reverse Transcriptase Inhibitor." Antimicrobial Agents and Chemotherapy 57, no. 11 (August 19, 2013): 5320–29. http://dx.doi.org/10.1128/aac.01377-13.
Full textRoberts, C. J., David John Edwards, M. Reza Hosseini, Monica Mateo-Garcia, and De-Graft Owusu-Manu. "Post-occupancy evaluation: a review of literature." Engineering, Construction and Architectural Management 26, no. 9 (October 21, 2019): 2084–106. http://dx.doi.org/10.1108/ecam-09-2018-0390.
Full textSampath, Rahul, Nathan W. Cummins, and Andrew D. Badley. "Casp8p41: The Protean Mediator of Death in CD4 T-cells that Replicate HIV." Journal of Cell Death 9 (January 2016): JCD.S39872. http://dx.doi.org/10.4137/jcd.s39872.
Full textChang, Allison, Cynthia Rudin, Michael Cavaretta, Robert Thomas, and Gloria Chou. "How to reverse-engineer quality rankings." Machine Learning 88, no. 3 (June 3, 2012): 369–98. http://dx.doi.org/10.1007/s10994-012-5295-6.
Full textKinsbourne, Marcel. "How to Reverse Engineer Visual Cognition." Contemporary Psychology 48, no. 4 (August 2003): 451–54. http://dx.doi.org/10.1037/000852.
Full textKalantari, John, Heidi Nelson, and Nicholas Chia. "The Unreasonable Effectiveness of Inverse Reinforcement Learning in Advancing Cancer Research." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 01 (April 3, 2020): 437–45. http://dx.doi.org/10.1609/aaai.v34i01.5380.
Full textZanni, Mariangela, Tim Sharpe, Philipp Lammers, Leo Arnold, and James Pickard. "Developing a Methodology for Integration of Whole Life Costs into BIM Processes to Assist Design Decision Making." Buildings 9, no. 5 (May 5, 2019): 114. http://dx.doi.org/10.3390/buildings9050114.
Full textDEMAGALHAES, J., and O. TOUSSAINT. "How bioinformatics can help reverse engineer human aging." Ageing Research Reviews 3, no. 2 (April 2004): 125–41. http://dx.doi.org/10.1016/j.arr.2003.08.006.
Full textMichael, Iacovos P., Sadegh Saghafinia, and Douglas Hanahan. "A set of microRNAs coordinately controls tumorigenesis, invasion, and metastasis." Proceedings of the National Academy of Sciences 116, no. 48 (November 8, 2019): 24184–95. http://dx.doi.org/10.1073/pnas.1913307116.
Full textDuchscherer, Samantha, Robert Stewart, and Marie Urban. "revengc: An R package to Reverse Engineer Summarized Data." R Journal 10, no. 2 (2019): 114. http://dx.doi.org/10.32614/rj-2018-044.
Full textDissertations / Theses on the topic "Barrier to reverse engineer"
Knight, Darren C. "Return on Investment Analysis for Implementing Barriers to Reverse Engineering and Imitation." BYU ScholarsArchive, 2011. https://scholarsarchive.byu.edu/etd/2633.
Full textGermann, Christian. "Pricing Multi Barrier Reverse Convertibles." St. Gallen, 2008. http://www.biblio.unisg.ch/org/biblio/edoc.nsf/wwwDisplayIdentifier/97193445002/$FILE/97193445002.pdf.
Full textErni, David. "Rendite und Risiko von Barrier Reverse Convertibles." St. Gallen, 2007. http://www.biblio.unisg.ch/org/biblio/edoc.nsf/wwwDisplayIdentifier/04602694001/$FILE/04602694001.pdf.
Full textLindauer, Thomas. "An Empirical Analysis of (Multi-) Barrier Reverse Convertibles." St. Gallen, 2008. http://www.biblio.unisg.ch/org/biblio/edoc.nsf/wwwDisplayIdentifier/02600518002/$FILE/02600518002.pdf.
Full textSmedberg, Gustav, and Jenny Malmgren. "Is it possible to reverse engineer obfuscated bytecode back to source code?" Thesis, KTH, Hälsoinformatik och logistik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-278065.
Full textSammanfattning Det finns mycket gammal mjukvara ute i världen som inte längre underhålls och skulle behöva uppdateras för att kunna täppa säkerhetshål alternativtuppdatera funktioner i dessa program. I fall där källkoden har förlorats ellerraderats , skulle det då vara möjligt att använda dekompilering för att återfåkällkoden? Rapport syftar till att redovisa vad java bytekod är och hur den används samthur man kan gå från java bytekod tillbaka till källkod genom en process somkallas dekompilering samt hur man kan skydda sig mot detta genom obfuskeringav kod. Vidare redovisas tidigare forskning inom dekompilering samtobfuskering och kompletterar med förklaringar vad en Java Virtual Machine,Bytekod och obfuskering är och hur de fungerar. Tre program av varierande komplexitet görs om till bytekod, obfuskeras för att sedan dekompileras ochjämföra resultatet gentemot källkoden. Slutligen, det är möjligt att dekompilera den obfuskerade koden men enbartvissa delar av källkoden går att återskapa. Alla variabelnamn och oanvändametoder försvinner helt samt att koden ibland ändras till icke-konventionellasätt att programmera. Nyckelord Reverse engineering, Java, JVM, bytecode, obfuskering, dekompilering, säkerhet
Graetzel, Chauncey. "MEMS & high speed vision : development and application to reverse-engineer Drosophila flight control /." Zürich : ETH, 2008. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=18096.
Full textKunanandam, Visakasuntharam. "Reverse flow of brain interstitial fluid through venular blood-brain barrier." Thesis, University of Hull, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.363207.
Full textBowman, David C. "Image Stitching and Matching Tool in the Automated Iterative Reverse Engineer (AIRE) Integrated Circuit Analysis Suite." Wright State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=wright1533766175549951.
Full textKandikonda, Balausha Varshini. "A Key Based Obfuscation and Anonymization of Behavior VHDL Models." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7686.
Full textLuk-Cyr, Jacques. "Experiments and modeling of multilayered coatings and membranes : application to thermal barrier coatings and reverse osmosis membranes." Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/93822.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 153-157).
In this thesis, I developed a novel methodology for characterizing interfacial delamination of thermal barrier coatings. The proposed methodology involves novel experiments-plus numerical simulations in order to determine the material parameters describing such failure when the interface is modeled using traction-separation constitutive laws. Furthermore, a coupled fluid-permeation and large deformation theory is proposed for crosslinked polymers with a view towards application to reverse-osmosis. A systematic simulation plus experiment-based methodology is proposed in order to calibrate the material parameters of the theory. Finally, the process of reverse osmosis is studied in the context of water desalination. An experimental set-up is proposed in order to characterize the thin-film composite membranes widely used in the industry, and a preliminary set of experiments are performed.
by Jacques Luk-Cyr.
Part 1. Thermal barrier coatings -- part 2. Reverse osmosis membranes -- part 3. Thin-film-composite membranes: application to reverse osmosis in water desalination.
S.M.
Books on the topic "Barrier to reverse engineer"
Clement, Dennett Daniel, and Adams Reginald B, eds. Inside jokes: Using humor to reverse-engineer the mind. Cambridge, Mass: MIT Press, 2011.
Find full textAddison, Wesley Software. Reverse Engineer Rootkit. Pearson Education, Limited, 2020.
Find full textDennett, Daniel C., Matthew M. Hurley, and Reginald B. Adams Jr. Inside Jokes: Using Humor to Reverse-Engineer the Mind. MIT Press, 2011.
Find full textWong, Reginald. Mastering Reverse Engineering: Re-engineer your ethical hacking skills. Packt Publishing, 2018.
Find full textDennett, Daniel C., Matthew M. Hurley, and Adams Reginald B. Jr. Inside Jokes: Using Humor to Reverse-Engineer the Mind. MIT Press, 2011.
Find full textDecoding Greatness: How the Best in the World Reverse Engineer Success. Simon & Schuster, 2021.
Find full textFriedman, Ron. Decoding Greatness: How the Best in the World Reverse Engineer Success. Simon & Schuster Audio and Blackstone Publishing, 2021.
Find full textFriedman, Ron. Decoding Greatness: How the Best in the World Reverse Engineer Success. Simon & Schuster, 2021.
Find full textJames, Paul. Reverse Engineer Your Future: Stop Waiting for Success - Go Out and Make It Happen Now. Lioncrest Publishing, 2017.
Find full textBook chapters on the topic "Barrier to reverse engineer"
Amarilli, Antoine, David Naccache, Pablo Rauzy, and Emil Simion. "Can a Program Reverse-Engineer Itself?" In Cryptography and Coding, 1–9. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25516-8_1.
Full textUrendes Jiménez, Eloy, Antonio Flores Caballero, Francisco Molina Rueda, Javier Iglesias Giménez, and Roberto Oboe. "Reverse-Engineer the Brain: Perspectives and Challenges." In Biosystems & Biorobotics, 173–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38556-8_9.
Full textBandyopadhyay, Anirban. "Philosophical Transformation Essential to Reverse Engineer Consciousness." In Nanobrain, 1–24. Boca Raton : CRC Press, [2020]: CRC Press, 2020. http://dx.doi.org/10.1201/9780429107771-1.
Full textRoe, Michael. "How to reverse engineer an EES device." In Fast Software Encryption, 305–28. Berlin, Heidelberg: Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/3-540-60590-8_24.
Full textLe Bouder, Hélène, Sylvain Guilley, Bruno Robisson, and Assia Tria. "Fault Injection to Reverse Engineer DES-Like Cryptosystems." In Foundations and Practice of Security, 105–21. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-05302-8_7.
Full textDugerdil, Philippe, and Roland Sako. "Dynamic Analysis Techniques to Reverse Engineer Mobile Applications." In Communications in Computer and Information Science, 250–68. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30142-6_14.
Full textWu, Zewei, Min Shu, Junzheng Shi, Zigang Cao, Fei Xu, Zhen Li, Gang Xiong, and S. M. Yiu. "How to Reverse Engineer ICS Protocols Using Pair-HMM." In Information and Communication Technology for Intelligent Systems, 115–25. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1747-7_12.
Full textWagner, James, and Alexander Rasin. "A Framework to Reverse Engineer Database Memory by Abstracting Memory Areas." In Lecture Notes in Computer Science, 304–19. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59003-1_20.
Full textHunt, Alexander J., Nicholas S. Szczecinski, Emanuel Andrada, Martin Fischer, and Roger D. Quinn. "Using Animal Data and Neural Dynamics to Reverse Engineer a Neuromechanical Rat Model." In Biomimetic and Biohybrid Systems, 211–22. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-22979-9_21.
Full textPluta, Ryszard, A. Misicka, M. Barcikowska, S. Spisacka, A. W. Lipkowski, and S. Januszewski. "Possible Reverse Transport of β-Amyloid Peptide Across the Blood-Brain Barrier." In Brain Edema XI, 73–77. Vienna: Springer Vienna, 2000. http://dx.doi.org/10.1007/978-3-7091-6346-7_15.
Full textConference papers on the topic "Barrier to reverse engineer"
Knight, Darren C., and Christopher A. Mattson. "Return on Investment Analysis for Implementing Barriers to Reverse Engineering." In ASME 2011 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2011. http://dx.doi.org/10.1115/detc2011-47094.
Full textHarston, Stephen P., and Christopher A. Mattson. "Metrics for Evaluating and Optimizing the Barrier and Time to Reverse Engineer a Product." In ASME 2009 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/detc2009-86781.
Full textCurtis, Shane K., Stephen P. Harston, and Christopher A. Mattson. "A Generic Formulaic Characterization of the Time to Reverse Engineer the Tolerances of a Product." In ASME 2009 International Mechanical Engineering Congress and Exposition. ASMEDC, 2009. http://dx.doi.org/10.1115/imece2009-13123.
Full textCurtis, Shane K., Christopher A. Mattson, and Stephen P. Harston. "On Barriers to Reverse Engineering Mechanical Components." In ASME 2010 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2010. http://dx.doi.org/10.1115/detc2010-28610.
Full textNelson, Daniel A. "Development of a Non-Contacting Mechanical Seal for High Performance Turbocharger Applications." In ASME Turbo Expo 2018: Turbomachinery Technical Conference and Exposition. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/gt2018-77126.
Full textRagupathy, R., R. K. Mishra, and R. D. Misal. "Life Estimation of TBC on an Aero Gas Turbine Combustor: A Finite Element Approach." In ASME 2011 Turbo Expo: Turbine Technical Conference and Exposition. ASMEDC, 2011. http://dx.doi.org/10.1115/gt2011-45027.
Full textStorey, Margaret-Anne D. "Beyond the Lone Reverse Engineer: Insourcing, Outsourcing and Crowdsourcing." In 2009 16th Working Conference on Reverse Engineering. WCRE 2009. IEEE, 2009. http://dx.doi.org/10.1109/wcre.2009.57.
Full textLabiche, Yvan, Bojana Kolbah, and Hossein Mehrfard. "Combining Static and Dynamic Analyses to Reverse-Engineer Scenario Diagrams." In 2013 IEEE International Conference on Software Maintenance (ICSM). IEEE, 2013. http://dx.doi.org/10.1109/icsm.2013.24.
Full textSmith III, James F., and Thanh Vu H. Nguyen. "Genetic program based data mining to reverse engineer digital logic." In Defense and Security Symposium, edited by Belur V. Dasarathy. SPIE, 2006. http://dx.doi.org/10.1117/12.664952.
Full textWang, FengQin, HengJin Ke, and JianBin Liu. "Towards the Reverse Engineer of UML2.0 Sequence Diagram for Procedure Blueprint." In 2009 WRI World Congress on Software Engineering. IEEE, 2009. http://dx.doi.org/10.1109/wcse.2009.128.
Full textReports on the topic "Barrier to reverse engineer"
Synakowski, E. J., M. A. Beer, and S. H. Batha. Local transport barrier formation and relaxation in reverse-shear plasmas on the TFTR tokamak. Office of Scientific and Technical Information (OSTI), February 1997. http://dx.doi.org/10.2172/304147.
Full text