词汇 | example_english_reverse-engineering |
释义 | Examples of reverse engineeringThese examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors. This is because simply reverseengineering the design solution often results in unsuitable cam profiles, linkage assemblies with excessive transmission angles, or unnecessary large mechanisms. In reverseengineering studies, most geometry has nonunique functionality; a shape can often be attributed both to end-user function and to assembly or manufacturing function. For the former goal, connection details that provide the required connection type are drawn from the reverseengineering database. They used the reverseengineering method, based on inferences to "designing" selection pressures from apparent psychological design, to predict psychological preferences. This reverseengineering could be used in practice, for example, by filling in a tax-form spreadsheet partly symbolically. However, here the decision was made to try to increase the completeness of the data prior to learning, by "reverseengineering" missing requirements values. The reverseengineering methodology employed in the example application creates building blocks from experience. In traditional commercial secrecy law, the concept of reverseengineering is an allowable method of determining the nature of a secret process or such like. Three main activities were identified: reverseengineering, restructuring and forward engineering. In fact, it should be evident that the logic was actually arrived at by reverseengineering the categorical notions. Functional modeling: toward a common language for design and reverseengineering. The trend in reverseengineering of nature is justified by the fact that, with millions of years of evolution, biological systems have evolved into very efficient and effective mechanisms. Design for assembly techniques in reverseengineering and redesign. A model of function-based representations reverseengineering to design synthesis when considering that cer tain computational synthesis methods rely on data archived from these reverseengineering analyses. We now created an ontology for the same domain through reverseengineering of this network and building upon the knowledge that had been elicited for its construction. A reverseengineering and redesign methodology for product evolution. It will include brokering and transfer of intangible technology, and it will also contain more explicit language on reverseengineering and on unintended technology transfer. From Europarl Parallel Corpus - English A less high profile exception that is important economically is the right of reverseengineering of computer software. From Europarl Parallel Corpus - English We want to ensure interoperability to enable computer programmers to engage in reverseengineering practices and to decompile programs for experimental purposes without risking infringement or legal action. From Europarl Parallel Corpus - English Many mobile phones have their own proprietary operating systems, which makes reverseengineering of such devices a very complex operation. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Recovery is based on the interpretation of file content, usually through the process of reverseengineering a file type. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Engineers often investigate the intended purpose (or utility function) of a piece of equipment using reverseengineering. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Furthermore, reproduction for reverseengineering of a mask work is specifically permitted by the law. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. However, purpose of this vector is to obfuscate the code against reverseengineering. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Common terms imposed by these licenses include the prohibition of resale, modification, and/or reverseengineering. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Although this information can instead be learned by reverseengineering, this is much more difficult with hardware than it is with software. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. It is felt that deformulation or reverseengineering helps to educate and promote healthy competition. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. This process is related to a concept of reverseengineering. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Modern dongles include built-in strong encryption and use fabrication techniques designed to thwart reverseengineering. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. One common motivation of reverseengineering is to determine whether a competitor's product contains patent infringements or copyright infringements. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. He is also an expert on software reverseengineering, software development, and developing software in a clean-room environment. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. A partial description was leaked in 1997 and completed via reverseengineering. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Reverseengineering attempts to discover the original problem-solving logic used in developing a product by taking it apart. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. These jailbreaks are harder to make and take a lot of reverseengineering and years of experience. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. While reverseengineering an executable, many tools refer to the symbol table to check what addresses have been assigned to global variables and known functions. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. An alternative technique is known among competitive intelligence professionals as strategys reverseengineering which looks for the underlying assumptions which can rationalize existing strategy. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Some of these regulations include a lock and key system to prevent reverseengineering. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Round-trip engineering is often wrongly defined as simply supporting both forward and reverseengineering. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. He called the duplication a type of reverseengineering to obtain non-protectable information. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. When no technical documentation is available, an understanding of the underlying hardware is often gained by clean room reverseengineering. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Once the lawsuit became known, it attracted considerable attention from the online community, far overshadowing the discussion of the reverseengineering itself. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Reverseengineering has its origins in the analysis of hardware for commercial or military advantage. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Software anti-tamper technology like obfuscation is used to deter both reverseengineering and re-engineering of proprietary software and software-powered systems. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Reverseengineering of software can make use of the clean room design technique to avoid copyright infringement. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. He is an expert in computer security and reverseengineering as well as a skeptic. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The comments refined the definition by listing several "proper" means of discovery, including discovery by independent invention, reverseengineering, licensing arrangement, and published literature. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Video game companies consider these devices as a tool for reverseengineering to circumvent copying. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Software metrics and reverseengineering can be described as forms of static analysis. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Looking at a hex dump of data is commonly done as a part of debugging, or of reverseengineering. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. It is an alternative and often preferred way of describing reverseengineering software and hardware. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. It started with hurriedly assembled hodgepodge of institutes and organizations focusing on reverse engineering, licensing and copying, imitations, and at times right-out pirating. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Hocevar is renowned for his expertise in reverseengineering and image processing. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. In earlier times it was often used to discourage reverseengineering of proprietary products built as printed circuit modules. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. It was an early example of reverseengineering where a product is analysed, and then reconstituted. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. This case had lasting implications, setting precedent for copyright and reverseengineering. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The challenge of cracking and reverseengineering complicated software is what makes it such an attraction. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Encapsulated knowledge, on the other hand, facilitates the marketing of knowledge since it can only be partially misappropriated through expensive reverseengineering. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. This is also done to obfuscate against reverseengineering. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. This is especially useful for reverseengineering device drivers. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Reverseengineering is a process of examination only: the software system under consideration is not modified (which would make it re-engineering). From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. It was created by reverseengineering edonkey protocol and redesigned from scratch. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. For instance, instead of reverseengineering our theories from observation, we can enumerate systems and then try to match them to the behaviors we observe. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The newer implementations often rely on clean-room reverseengineering in the absence of technical data to achieve interoperability. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Another use is in obfuscating the control or dataflow of a program in order to make reverseengineering harder. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The basic threats: analysis, reverseengineering, copying and illegal distribution, cheats and bots. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. It was initially kept secret, but became public knowledge through leaks and reverseengineering. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. This process eliminates the possibility of local reverseengineering as the code used to authenticate the password does not reside on the local machine. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Moreover, "reverseengineering" is not always able to reveal the differences between more-reliable and less-reliable diode laser products. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Few manufacturers published technical specifications for their hardware, leaving it to programmers and developers to deduce the exact workings of a console through reverseengineering. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The specifications were the result of reverseengineering several popular computers at the time. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The section contains a number of specific limitations and exemptions, for such things as government research and reverseengineering in specified situations. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The developers of nouveau have been forced to uses clean-room reverseengineering to obtain the necessary data to enable them to write nouveau. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. End user license agreements forbidding reverseengineering are common in software, but less so in other business areas. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. One of the key roles of the ministry was locating, and if necessary, reverseengineering overseas technology. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. In some cases, the goal of the reverseengineering process can simply be a redocumentation of legacy systems. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The case has redefined how reverseengineering with unlicensed products is seen in legal issues involving copyright. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors. |
反思网英语在线翻译词典收录了377474条英语词汇在线翻译词条,基本涵盖了全部常用英语词汇的中英文双语翻译及用法,是英语学习的有利工具。