Sciweavers

533 search results - page 36 / 107
» Control flow based obfuscation
Sort
View
162
Voted
COMPSAC
2003
IEEE
15 years 7 months ago
Data-Flow-Based Unit Testing of Aspect-Oriented Programs
The current research so far in aspect-oriented software development is focused on problem analysis, software design, and implementation techniques. Even though the importance of s...
Jianjun Zhao
138
Voted
ICC
2000
IEEE
123views Communications» more  ICC 2000»
15 years 6 months ago
A Per-Flow Based Node Architecture for Integrated Services Packet Networks
As the Internet transforms from the traditional best-effort service network into QoS-capable multi-service network, it is essential to have new architectural design and appropriate...
Dapeng Wu, Yiwei Thomas Hou, Takeo Hamada, Zhi-Li ...
GCC
2010
Springer
15 years 14 days ago
DFC: Towards Effective Feedback Flow Management for Datacenters
Quality of Service (QoS) is essential to datacenters, which requires effective schemes to manage the flows among numerous servers. However, existing management techniques mainly fo...
Baohua Yang, Guodong Li, Yaxuan Qi, Yibo Xue, Jun ...
AUGHUMAN
2011
14 years 9 months ago
"Vection field" for pedestrian traffic control
: Today in general traffic field, visual signs and audio cues are used for pedestrian control. As the pedestrians need to acquire and recognize them, time delay between cognition a...
Masahiro Furukawa, Hiromi Yoshikawa, Taku Hachisu,...
ACSAC
2009
IEEE
15 years 6 months ago
A Network Access Control Mechanism Based on Behavior Profiles
Abstract--Current Network Access Control (NAC) technologies manage the access of new devices into a network to prevent rogue devices from attacking network hosts or services. Typic...
Vanessa Frías-Martínez, Joseph Sherr...