Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,257,922 papers from all fields of science
Search
Sign In
Create Free Account
Reversing: Secrets of Reverse Engineering
Known as:
Reversing
Reversing: Secrets of Reverse Engineering is a textbook written by Eldad Eilam on the subject of reverse engineering software, mainly within a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Copy protection
Debugger
Digital rights management
Interactive Disassembler
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
CHARACTERIZATIONS OF L-CONVEX SPACES
B. Pang
,
Yi Zhao
2016
Corpus ID: 54932104
In this paper, the concepts of $L$-concave structures, concave $L$-interior operators and concave $L$-neighborhood systems are…
Expand
Highly Cited
2011
Highly Cited
2011
Self-Assembled and Cross-Linked Fullerene Interlayer on Titanium Oxide for Highly Efficient Inverted Polymer Solar Cells
Yen‐Ju Cheng
,
F. Cao
,
Wei Lin
,
Chiu-Hsiang Chen
,
Chao-Hsiang Hsieh
2011
Corpus ID: 73718259
We have successfully designed and synthesized two oxetane-functionalized fullerene derivatives, [6,6]-phenyl-C61-butyric oxetane…
Expand
Highly Cited
2007
Highly Cited
2007
Formalism-Independent Parser Evaluation with CCG and DepBank
S. Clark
,
J. Curran
Annual Meeting of the Association for…
2007
Corpus ID: 1801055
A key question facing the parsing community is how to compare parsers which use different grammar formalisms and produce…
Expand
Highly Cited
2005
Highly Cited
2005
Aeolian processes in Proctor Crater on Mars: Mesoscale modeling of dune‐forming winds
L. Fenton
,
A. Toigo
,
M. Richardson
2005
Corpus ID: 55563377
[1] Both atmospheric modeling and spacecraft imagery of Mars are now of sufficient quality that the two can be used in…
Expand
Highly Cited
2005
Highly Cited
2005
On Blind Compression of Encrypted Correlated Data Approaching The Source Entropy Rate
D. Schonberg
,
S. Draper
,
K. Ramchandran
2005
Corpus ID: 18936472
Traditional data transmission over an insecure noiseless channel consists of first compressing data for efficiency and then…
Expand
Highly Cited
2002
Highly Cited
2002
On the influence of laminate stacking on buckling of composite cylindrical shells subjected to axial compression
B. Geier
,
H. Meyer-Piening
,
R. Zimmermann
2002
Corpus ID: 55561962
Highly Cited
2002
Highly Cited
2002
On the Voltage Mirrors and the Current Mirrors
I. A. Awad
,
A. Soliman
2002
Corpus ID: 61601794
The voltage mirror and the current mirror are two pathological elements used to represent active devices featuring voltage or…
Expand
Highly Cited
2000
Highly Cited
2000
The IGrid index: reversing the dimensionality curse for similarity indexing in high dimensional space
C. Aggarwal
,
Philip S. Yu
Knowledge Discovery and Data Mining
2000
Corpus ID: 15608971
The similarity search and indexing problem is well known to be a di cult one for high dimensional applications. Most indexing…
Expand
Highly Cited
1988
Highly Cited
1988
The Recording Angel: Music, Records and Culture from Aristotle to Zappa
Evan Eisenberg
1988
Corpus ID: 191412704
First published in 1987 and now considered a classic, The Recording Angel charts the ways in which the phonograph and its cousins…
Expand
Highly Cited
1968
Highly Cited
1968
Cellular Interconnection Arrays
W. Kautz
,
K. Levitt
,
A. Waksman
IEEE transactions on computers
1968
Corpus ID: 34496031
Abstract—A class of networks is described that has the capability of permuting in an arbitrary manner a set of n digital input…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE