劉春雨, Liu, Chunyu.
published_or_final_version / Mechanical Engineering / Doctoral / Doctor of Philosophy
Thesis (Ph. D.)--University of Hong Kong, 2000. / Includes bibliographical references (leaves 153-164).
Ein direktes Verfahren zur Segmentierung unstrukturierter Punktdaten und Bestimmung algebraischer OberflächenelementeVančo, Marek. January 2003 (has links) (PDF)
Chemnitz, University, Diss., 2003. / Text engl.
Die Präprozessor-Problematik im Reverse-Engineering und beim Programmverstehen : [what the programmer sees is not what the compiler gets.] /Riediger, Volker. January 2005 (has links)
Univ., Diss.--Koblenz-Landau, 2004.
Head, Todd Connell
27 February 2012
A reverse engineering toolbox containing measurement and disassembly tools needed to reverse engineer products in a high school engineering classroom would be helpful to many high school teachers. This study investigates and delineates the possibilities for such a toolbox in order to reverse engineer products in specific product domains. The study finds that certain tools are very useful for a wide variety of products; however, certain products require more specialized equipment not included in the toolbox. Recommendations are provided for generic and specialized equipment across product domains. This information will be helpful to high school teachers setting up reverse engineering projects and are deciding which tools and equipment are needed for the project. / text
Eid, Roy George
26 July 2012
Reverse engineering, the technique of using different tools and methodology to recreate an object or machine, is increasingly used in academia to solidify theoretical concepts as part of the Kolb learning cycle. This thesis aims to aid the use of reverse engineering as a pedagogical tool by developing a toolbox that can be used by students, and professionals alike, to properly reverse engineer a mechanical or electro-mechanical product. The development begins with an analysis of House of Quality matrices, a design methodology tool used by the industry to relate customer needs to engineering metrics and specifications. After a consolidated list of metrics was developed, the appropriate tools to properly quantify said metrics were researched and documented. Finally, a toolbox was created, with set goals in mind, and applied in two case studies to analyze its performance. Simultaneously, a portable dynamometer was developed, documented, and tested, with the goal of creating an inexpensive and accessible tool to measure the power output of fractional horsepower DC and AC motors. / text
Howard, Nicole Lane
04 November 2011
Engineering curricula for high schools has and will become increasingly important as STEM (Science Technology Engineering and Mathematics) education matures and grows across the country. Active learning and hands-on pedagogies are critical to the development of these curricula, connecting students to the integrated topics using all senses and a commitment to self-learning. One approach to curriculum development for the Engineering, applied Science, and applied Mathematics in STEM is design-based learning (DBL). For this report, a particular methodology, known as Reverse Engineering and Redesign, is explored for DBL. The Reverse Engineering and Redesign process is used to redesign the current University of Texas’ UTeachEngineering reverse engineering curriculum. The UTeachEngineering curriculum is compared to the Engineering the Future, Ford PAS, The Infinity Project, and Project Lead the Way to determine the TEKS covered by each curriculum. The redesign focused on adding various writing and reflection exercises throughout the curriculum, and adding specification sheets and rubrics to all the student deliverables. The writing exercises are essential to allow the students to fully explore, comprehend, and appreciate the material. Specification sheets and rubrics are essential for the students to understand what is expected of them to attain mastery of the reverse engineering and redesign curriculum. / text
12 January 2015
In this dissertation, we focus on dynamic analyses that examine the data handled by programs and operating systems in order to divine the undocumented constraints and implementation details that determine their behavior in the field. First, we introduce a novel technique for uncovering the constraints actually used in OS kernels to decide whether a given instance of a kernel data structure is valid. Next, we tackle the semantic gap problem in virtual machine security: we present a pair of systems that allow, on the one hand, automatic extraction of whole-system algorithms for collecting information about a running system, and, on the other, the rapid identification of “hook points” within a system or program where security tools can interpose to be notified of security-relevant events. Finally, we present and evaluate a new dynamic measure of code similarity that examines the content of the data handled by the code, rather than the syntactic structure of the code itself. This problem has implications both for understanding the capabilities of novel malware as well as understanding large binary code bases such as operating system kernels.
Doherty, Leslie Edward.
Thesis (Ph.D.)--University of South Australia, 1997.
Diss.--Universität Köln, 2008/2009. / Includes bibliographical references and index.
Page generated in 0.1071 seconds