Sciweavers

1359 search results - page 7 / 272
» Black-Box Program Specialization
Sort
View
ISW
2007
Springer
14 years 1 months ago
On the Concept of Software Obfuscation in Computer Security
Abstract. Program obfuscation is a semantic-preserving transformation aimed at bringing a program into such a form, which impedes the understanding of its algorithm and data struct...
Nikolay Kuzurin, Alexander Shokurov, Nikolay P. Va...
IJNSEC
2008
150views more  IJNSEC 2008»
13 years 7 months ago
Tamper Resistant Software Through Intent Protection
One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
Alec Yasinsac, J. Todd McDonald
FOCS
2006
IEEE
14 years 1 months ago
Algorithms on negatively curved spaces
d abstract] Robert Krauthgamer ∗ IBM Almaden James R. Lee † Institute for Advanced Study We initiate the study of approximate algorithms on negatively curved spaces. These spa...
Robert Krauthgamer, James R. Lee
EUROPAR
2003
Springer
14 years 20 days ago
Preventive Multi-master Replication in a Cluster of Autonomous Databases
We consider the use of a cluster of PC servers for Application Service Providers where applications and databases must remain autonomous. We use data replication to improve data av...
Esther Pacitti, M. Tamer Özsu, Cédric ...
PTS
2003
136views Hardware» more  PTS 2003»
13 years 8 months ago
The UML 2.0 Testing Profile and Its Relation to TTCN-3
UML models focus primarily on the definition of system structure and behaviour, but provide only limited means for describing test objectives and test procedures. However, with the...
Ina Schieferdecker, Zhen Ru Dai, Jens Grabowski, A...