Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Reverse engineering

Known as: Sujar as mãos, Reverse, Reverse-engineering 
Reverse engineering, also called back engineering, is the processes of extracting knowledge or design information from anything man-made and re… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
Feature models describe the common and variable characteristics of a product line. Their advantages are well recognized in… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
The security of embedded devices often relies on the secrecy of proprietary cryptographic algorithms. These algorithms and their… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2007
Highly Cited
2007
www.sciencemag.org (this information is current as of January 8, 2009 ): The following resources related to this article are… Expand
  • figure 1
  • figure 3
  • figure 2
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Application-level protocol specifications are useful for many security applications, including intrusion prevention and detection… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Reverse engineering software systems has become a major concern in software industry because of their sheer size and complexity… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Graphical user interfaces (GUIs) are important parts oftoday's software and their correct execution is required toensure the… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2000
Highly Cited
2000
1. Journeys in Product Development. 2. Product Development Process Tools. 3. Scoping Product Developments: Technical and Business… Expand
Is this relevant?
Highly Cited
2000
Highly Cited
2000
By the early 1990s the need for reengineering legacy systems was already acute, but recently the demand has increased… Expand
  • figure 1
Is this relevant?
Highly Cited
1999
Highly Cited
1999
Designing at higher levels of abstraction is key to managing the complexity of today's VLSI chips. The authors show how they… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1990
Highly Cited
1990
The key to applying computer-aided software engineering to the maintenance and enhancement of existing systems lies in applying… Expand
  • figure 1
  • figure 3
Is this relevant?