Skip to main content
We describe and demonstrate an algorithm that takes as input an unorganized set of points fx1; : : : ; x n g IR 3 on or near an unknown manifold M, and produces as output a simplicial surface that approximates M. Neither the topology, the... more
    • by 
    •   13  
      Neural NetworkReverse EngineeringGeometric modelSurface Reconstruction
Background: Elucidating gene regulatory networks is crucial for understanding normal cell physiology and complex pathologic phenotypes. Existing computational methods for the genomewide "reverse engineering" of such networks have been... more
    • by 
    •   25  
      BioinformaticsAlgorithmsCellular BiologyComputational Biology
Cellular phenotypes are determined by the differential activity of networks linking coregulated genes. Available methods for the reverse engineering of such networks from genome-wide expression profiles have been successful only in the... more
    • by 
    •   19  
      AlgorithmsArtificial IntelligenceLeukemiaReverse Engineering
Explicitly stated program invariants can help programmers by identifying program properties that must be preserved when modifying code. In practice, however, these invariants are usually implicit. An alternative to expecting programmers... more
    • by 
    •   14  
      Information SystemsSoftware MaintenancePattern RecognitionSoftware Evolution
This paper provides an extensive overview of existing research in the field of software refactoring. This research is compared and discussed based on a number of different criteria: the refactoring activities that are supported; the... more
    • by 
    •   12  
      Information SystemsObject Oriented ProgrammingSoftware MaintenanceTaxonomy
In many areas of industry, it is desirable to create geometric models of existing objects for which no such model is available. This paper reviews the process of reverse engineering of shapes. After identifying the purpose of reverse... more
    • by 
    •   14  
      Mechanical EngineeringGeometric ModellingComputer Aided DesignReverse Engineering
It has become more and more common to distribute software in forms that retain most or all of the information present in the original source code. An important example is Java bytecode. Since such codes are easy to decompile, they... more
    • by 
    •   4  
      Reverse EngineeringSource CodeCode ObfuscationInformation Presentation
One of the pressing open problems of computational systems biology is the elucidation of the topology of genetic regulatory networks (GRNs) using high throughput genomic data, in particular microarray gene expression data. The Dialogue... more
    • by 
    •   19  
      BioinformaticsAlgorithmsMachine LearningComputational Biology
The inference of transcriptional networks that regulate transitions into physiological or pathological cellular states remains a central challenge in systems biology. A mesenchymal phenotype is the hallmark of tumour aggressiveness in... more
    • by 
    •   21  
      Computational BiologyCellular ReprogrammingSystem BiologyMultidisciplinary
Inferring, or 'reverse-engineering', gene networks can be defined as the process of identifying gene interactions from experimental data through computational analysis. Gene expression data from microarrays are typically used for this... more
    • by 
    •   15  
      AlgorithmsComputational BiologyGene regulationSystems Biology
    • by  and +1
    •   8  
      Computational GeometryReverse EngineeringMedial axisSurface Reconstruction
1 Introduction In this paper, we present a new representation for piecewise smooth surfaces of arbitrary topological type, 1 and a method for fitting such surface models to scattered range data, where neither the topolog- ical type of the... more
    • by 
    •   9  
      Reverse EngineeringGeometric modelSurface ReconstructionAutomatic code generation
We identify three types of attack on the intellectual property contained in software, and three corresponding technical defenses. A potent defense against reverse engineering is obfuscation, a process that renders software unintelligible... more
    • by 
    •   12  
      Information SystemsIntellectual PropertyManufacturingWatermarking
    • by 
    •   8  
      EngineeringScienceSystems TheoryMultidisciplinary
We developed a dynamic model of a Nitinol artificial muscle activated biomimetic robot. The robot was reverse engineered from the American lobster and built in the Biomimetic Underwater Robot Program at Northeastern University. It is... more
    • by  and +1
    •   11  
      Mechanical EngineeringCognitive ScienceRemote SensingReverse Engineering
In this paper, we give an overview of the BitBlaze project, a new approach to computer security via binary analysis. In particular, BitBlaze focuses on building a unified binary analysis platform and using it to provide novel solutions to... more
    • by 
    •   8  
      Information SystemsComputer SecurityReverse EngineeringProgram verification
Systems biology aims to develop mathematical models of biological systems by integrating experimental and theoretical techniques. During the last decade, many systems biological approaches that base on genome-wide data have been developed... more
    • by 
    •   26  
      EngineeringGene regulationSystems BiologySystem Biology
We propose a scheme to reverse-engineer gene networks on a genome-wide scale using a relatively small amount of gene expression data from microarray experiments. Our method is based on the empirical observation that such networks are... more
    • by 
    •   12  
      AlgorithmsComputational ComplexityMultidisciplinaryReverse Engineering
Software engineers often use high-level models (for instance, box and arrow sketches) to reason and communicate about an existing software system. One problem with high-level models is that they are almost always inaccurate with respect... more
    • by 
    •   17  
      Information SystemsCognitive ScienceSoftware EngineeringSoftware Maintenance
Foreign direct investment (FDI) can benefit innovation activity in the host country via spillover channels such as reverse engineering, skilled labor turnovers, demonstration effects, and suppliercustomer relationships. Using provincial... more
    • by 
    •   9  
      EconomicsTime SeriesForeign Direct InvestmentReverse Engineering
Advances in computer speed, memory capacity and hardware graphics acceleration have made the interactive manipulation and visualization of complex, detailed (and therefore large) three-dimensional models feasible. These models are... more
    • by 
    •   5  
      Cognitive ScienceComputer VisionReverse EngineeringObject Representation
    • by 
    •   11  
      Information SystemsDocumentationSoftware ArchitectureProgram Analysis
    • by 
    •   4  
      Java ProgrammingReverse EngineeringSource CodeCode Obfuscation
    • by 
    •   18  
      Computer ArchitectureSoftware MaintenanceSoftware DevelopmentSystems Analysis
This paper describe s a c ollection of algorithms that we developed and implemented to facilitate the automatic recovery of the modular structure of a software system from its source c ode. We treat automatic modularization as an... more
    • by 
    •   6  
      Genetic AlgorithmReverse EngineeringOptimization ProblemSource Code
A good object-oriented design does not necessarily make a good component-based design, and vice versa. What design principles do components introduce? This paper examines component-based programming and how it expands the design space in... more
    • by 
    •   42  
      Computer ScienceComputer ArchitectureSoftware EngineeringObject Oriented Programming
A method for concise, faithful approximation of complex 3D datasets is key to reducing the computational cost of graphics applications. Despite numerous applications ranging from geometry compression to reverse engineering, efficiently... more
    • by 
    •   4  
      Information SystemsComputer ScienceReverse EngineeringSurfaces
The identification of design patterns as part of the reengineering process can convey important information to the designer. However, existing pattern detection methodologies generally have problems in dealing with one or more of the... more
    • by 
    •   5  
      Software ReengineeringDesign PatternsReverse EngineeringObject Oriented Hypermedia Design Methodology
In this paper, we describe a hierarchical face clustering algorithm for triangle meshes based on fitting primitives belonging to an arbitrary set. The method proposed is completely automatic, and generates a binary tree of clusters, each... more
    • by 
    •   4  
      Cognitive ScienceReverse EngineeringMesh SegmentationBinary Tree
3D imaging sensors for the acquisition of three dimensional (3D) shapes have created, in recent years, a considerable degree of interest for a number of applications. The miniaturization and integration of the optical and electronic... more
    • by 
    •   7  
      Analytical ChemistryCultural HeritageReverse EngineeringVirtual Reality
    • by 
    •   3  
      Product DesignNew Product DevelopmentReverse Engineering
At the conclusion of the second DREAM conference [10], a few voices of reason suggested that reverse-engineering challenges should not be solely focused on the network inference. As the argument goes, only that which can be measured... more
    • by 
    •   22  
      EngineeringAlgorithmsPhysicsChemistry
    • by 
    •   7  
      Information SystemsReverse EngineeringSoftwareComputer Software
We present a novel graphical Gaussian modeling approach for reverse engineering of genetic regulatory networks with many genes and few observations. When applying our approach to infer a gene network for isoprenoid biosynthesis in... more
    • by 
    •   13  
      Computer GraphicsReverse EngineeringArabidopsis thalianaBiological Sciences
Systems biology approaches are extensively used to model and reverse engineer gene regulatory networks from experimental data. Conversely, synthetic biology allows ''de novo'' construction of a regulatory network to seed new functions in... more
    • by 
    •   19  
      Synthetic BiologyComputational BiologyGene regulationTime Series
Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for many network security applications. Recent work has proposed... more
    • by 
    •   5  
      Network SecurityReverse EngineeringSemantic InformationProtocol Specification
Due to globalh:ation of Integrated Circuit (!C) design flmv, rogue elements in the supply ch<:\in nm pirate ICs, overbuild ICs. a.ml insert ha.rdware trojaus. EPIC [1] obfuscates the design by randomly inserting additional gates; only a... more
    • by 
    •   12  
      EngineeringComputer ScienceSupply ChainReverse Engineering
Dissection of regulatory networks that control gene transcription is one of the greatest challenges of functional genomics. Using human genomic sequences, models for binding sites of known transcription factors, and gene expression data,... more
    • by 
    •   21  
      Computational BiologyCell CycleTranscription RegulationTranscription Factors
Today, even a moderately sized corporate intranet con-tains multiple firewalls and routers, which are all used to enforce various aspects of the global corporate security pol-icy. Configuring these devices to work in unison is difficult,... more
    • by 
    •   4  
      Reverse EngineeringLevels of AbstractionSpVulnerability Analysis
1. Reverse engineering: Starting from a rough published schematic, we determined the complete functional details of the cipher underpinning the challenge-response protocol in the DST. We accomplished this with only &quot;oracle&quot; or... more
    • by 
    •   6  
      Digital SignatureReverse EngineeringLong RangeSecurity Analysis
The position-specific weight matrix (PWM) model, which assumes that each position in the DNA site contributes independently to the overall protein-DNA interaction, has been the primary means to describe transcription factor binding site... more
    • by 
    •   23  
      BioinformaticsAlgorithmsTranscription FactorsReverse Engineering
    • by 
    •   5  
      Reverse EngineeringFormal Concept AnalysisCase StudyLessons Learned
We argue that essential facets of web services, and especially those useful to understand their interaction, are best described using process-algebraic notations. Web service description and execution languages such as BPEL are... more
    • by 
    •   14  
      BusinessAlgebraSoftware EngineeringWeb Services
Background In breast cancer, overexpression of the transmembrane tyrosine kinase ERBB2 is an adverse prognostic marker, and occurs in almost 30% of the patients. For therapeutic intervention, ERBB2 is targeted by monoclonal antibody... more
    • by 
    •   20  
      Breast CancerCell CycleCell SignalingTranscription Factors
Source model extraction-the automated extraction of information from system artifacts-is a common phase in reverse engineering tools. One of the major challenges of this phase is creating extractors that can deal with irregularities in... more
    • by 
    •   17  
      Software MaintenanceData MiningComputational LinguisticsCase Studies
By the early 1990s the need for reengineering legacy systems was already acute, but recently the demand has increased significantly with the shift toward web-based user interfaces. The demand by all business sectors to adapt their... more
    • by 
    •   11  
      Software EngineeringSoftware MaintenanceSoftware EvolutionUser Interface
A methodology for extracting an extended Entity-Relationship (EER) model from a relational database is presented. Through a combination of data schema and data instance analysis, an EER model is derived which is semantically richer and... more
    • by 
    •   7  
      Information SystemsRelational DatabaseReverse EngineeringDatabase Design
A fundamental issue in theoretical computer science is that of establishing unambiguous formal criteria for algorithmic output. This paper does so within the domain of computeraided geometric modeling. For practical geometric modeling... more
    • by 
    •   17  
      Computer GraphicsComputational GeometryComputer Aided DesignEngineering Design