Sciweavers

533 search results - page 32 / 107
» Control flow based obfuscation
Sort
View
ACIVS
2006
Springer
15 years 8 months ago
Water Flow Based Complex Feature Extraction
A new general framework for shape extraction is presented, based on the paradigm of water flow. The mechanism embodies the fluidity of water and hence can detect complex shapes. A ...
Xin U. Liu, Mark S. Nixon
135
Voted
ASIAN
2006
Springer
153views Algorithms» more  ASIAN 2006»
15 years 6 months ago
Automata-Based Confidentiality Monitoring
Abstract Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checkin...
Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jen...
TELSYS
2002
120views more  TELSYS 2002»
15 years 2 months ago
A Receiver-Driven Transport Protocol for the Web
Abstract. In this paper, we present a receiver-oriented, request/response protocol for the Web that is compatible with the dynamics of TCP's congestion control algorithm. The ...
Rajarshi Gupta, Mike Y. Chen, Steven McCanne, Jean...
SASO
2007
IEEE
15 years 8 months ago
Designing Self-Organising Emergent Systems based on Information Flows and Feedback-loops
For self-organising emergent solutions, there is no support to explicitly design system-wide information flows and feedback loops in those flows. This is problematic because the...
Tom De Wolf, Tom Holvoet
VL
1998
IEEE
116views Visual Languages» more  VL 1998»
15 years 6 months ago
Programming Web-Based Applications within a Data-Flow VL
This paper shows how a general purpose data flow visual programming environment can be effectively used to find, collect and manipulate information available on the web. The discu...
Roberto Idini, Mauro Mosconi, Marco Porta