Inicio  /  IEEE SOFTWARE  /  Vol: 19 Núm: 2 Par: 0 (2002)  /  Artículo
ARTÍCULO
TITULO

Reverse Engineering and Reengineering: After Y2K

Moore    
M. M.    

Resumen

No disponible

 Artículos similares

       
 
Guoqing Zhang, Junxin Li, Huimin Zeng, Wan Li, Qiang Wang and Aibing Huang    
The femur supports the entire body weight, and any damage or necrosis to this bone can significantly impair normal walking. Therefore, repairing the femur is essential to restoring its function. However, due to variations in human bone structure, standar... ver más
Revista: Coatings

 
Nicu?or Baroiu, Virgil Gabriel Teodor, Viorel Paunoiu, Georgiana-Alexandra Moro?anu and Iona?-Catalin Dumitrescu    
In most situations, for the proper design of a gerotor pump, numerous parameters must be taken into account: the pump geometry, the properties of the materials from which the pumps are made (Young?s modulus, Poisson?s coefficient, friction coefficients, ... ver más
Revista: Applied Sciences

 
Francisco Miguel García-Olmedo, Jesús García-Miranda and Pedro González-Rodelas    
The conjunctive normal form (CNF) algorithm is one of the best known and most widely used algorithms in classical logic and its applications. In its algebraic approach, it makes use in a loop of a certain well-defined operation related to the ?distributi... ver más
Revista: Algorithms

 
Lucrezia Lazzarini, Marco Civera, Vito Burgio, Mariana Rodriguez Reinoso, Paola Antonaci and Cecilia Surace    
This study outlines a novel procedure for the Finite Element Modelling and Analysis of motocross knee braces under race conditions. The aim is to quantitatively evaluate the effectiveness of such stabilisers in reducing the risk and consequences of muscu... ver más
Revista: Applied Sciences

 
Aleksandr Romanov, Anna Kurtukova, Anastasia Fedotova and Alexander Shelupanov    
This article is part of a series aimed at determining the authorship of source codes. Analyzing binary code is a crucial aspect of cybersecurity, software development, and computer forensics, particularly in identifying malware authors. Any program is ma... ver más
Revista: Information