Showing results 1 to 13 of 13
A form driven object-oriented reverse engineering methodology Lee, Heeseok; Yoo, C, INFORMATION SYSTEMS, v.25, no.3, pp.235 - 259, 2000-05 |
Component-based software architecture for biosystem reverse engineering Lee, Doheon, BIOTECHNOLOGY AND BIOPROCESS ENGINEERING, v.10, pp.400 - 407, 2005-09 |
Identification of Gene Networks with Time Delayed Regulation Based on Temporal Expression Profiles Kim, Jeong-Rae; Choo, Sang-Mok; Choi, Hyung-Seok; Cho, Kwang-Hyun, IEEE-ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS, v.12, no.5, pp.1161 - 1168, 2015-09 |
Inferring biomolecular regulatory networks from phase portraits of time-series expression profiles Cho, Kwang-Hyun; Kim, JR; Baek, S; Choi, HS; Choo, SM, FEBS LETTERS, v.580, pp.3511 - 3518, 2006-06 |
NURBS surface fitting using orthogonal coordinate transform for rapid product development Bae, Seok-Hyung; Choi, Byoung Kyu, COMPUTER-AIDED DESIGN, v.34, no.10, pp.683 - 690, 2002-09 |
Process reverse engineering for BPR: A form-based approach Kim, Kyoung-Ho; Kim, Young-Gul, INFORMATION & MANAGEMENT, v.33, no.4, pp.187 - 200, 1998-03 |
Rapid prototyping and reverse engineering application for orthopedic surgery planning Ahn, DG; Lee, JY; Yang, Dong-Yol, JOURNAL OF MECHANICAL SCIENCE AND TECHNOLOGY, v.20, pp.19 - 28, 2006-01 |
Reverse engineering application using structural patterns of repetitive elements in the genome = 유전체에서 반복적 요소의 구조적 패턴 추출을 이용한 역공학 연구link Jung, Byung-Ik; 정병익; et al, 한국과학기술원, 2010 |
Reverse engineering: high speed digitization of free-form surfaces by phase-shifting grating projection moire topography Kim, Seung-Woo; Choi, YB; Oh, JT, INTERNATIONAL JOURNAL OF MACHINE TOOLS MANUFACTURE, v.39, no.3, pp.389 - 401, 1999-03 |
Segmentation of measured point data using a parametric quadric surface approximation Yang, Min-Yang; Lee, E, COMPUTER-AIDED DESIGN, v.31, no.7, pp.449 - 457, 1999-06 |
ZeroKernel: Secure Context-isolated Execution on Commodity GPUs Kwon, Ohmin; Kim, Yonggon; Huh, Jaehyuk; Yoon, Hyunsoo, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.18, no.4, pp.1974 - 1988, 2021-07 |
가상화 기법으로 난독화된 실행 파일의 동적 분석 방법 = A dynamic analysis of virtualization-obfuscated binary executableslink 전준수; Jeon, Joon-Soo; et al, 한국과학기술원, 2012 |
프로그램의 구조와 상수 값을 이용하는 바이너리 실행 파일의 차이점 분석 박희완; 최석우; 서선애; 한태숙, 정보과학회논문지 : 소프트웨어 및 응용, v.35, no.7, pp.452 - 461, 2008-07 |
Discover