Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Reverse engineering

Known as: Sujar as mãos, Reverse, Reverse-engineering 
Reverse engineering, also called back engineering, is the processes of extracting knowledge or design information from anything man-made and re… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
Feature models describe the common and variable characteristics of a product line. Their advantages are well recognized in… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2008
Highly Cited
2008
The security of embedded devices often relies on the secrecy of proprietary cryptographic algorithms. These algorithms and their… Expand
  • figure 1
  • figure 2
Highly Cited
2007
Highly Cited
2007
www.sciencemag.org (this information is current as of January 8, 2009 ): The following resources related to this article are… Expand
  • figure 1
  • figure 3
  • figure 2
Highly Cited
2003
Highly Cited
2003
Graphical user interfaces (GUIs) are important parts oftoday's software and their correct execution is required toensure the… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Highly Cited
2003
Highly Cited
2003
Reverse engineering software systems has become a major concern in software industry because of their sheer size and complexity… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
Highly Cited
2002
Highly Cited
2002
Recently, laser scanners have been used more often for inspection and reverse engineering in industry, such as for motors… Expand
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Highly Cited
2000
Highly Cited
2000
1. Journeys in Product Development. 2. Product Development Process Tools. 3. Scoping Product Developments: Technical and Business… Expand
Review
1997
Review
1997
In many areas of industry, it is desirable to create geometric models of existing objects for which no such model is available… Expand
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Highly Cited
1996
Highly Cited
1996
This paper analyzes the requirements that CASE tools should meet for effective database reverse engineering (DBRE), and proposes… Expand
  • figure 11
  • figure 12
  • figure 11
  • figure 12
  • table 1
Highly Cited
1990
Highly Cited
1990
The key to applying computer-aided software engineering to the maintenance and enhancement of existing systems lies in applying… Expand
  • figure 1
  • figure 3