Sciweavers

533 search results - page 54 / 107
» Control flow based obfuscation
Sort
View
122
Voted
IEE
2008
108views more  IEE 2008»
15 years 2 months ago
Mining execution relations for crosscutting concerns
Aspect mining tries to identify crosscutting concerns in the code of existing systems and thus supports their adaption to an aspect-oriented design. A semi-automatic static aspect...
Jens Krinke
121
Voted
JLP
2010
142views more  JLP 2010»
14 years 9 months ago
Relational bytecode correlations
We present a calculus for tracking equality relationships between values through pairs of bytecode programs. The calculus may serve as a certification mechanism for noninterferenc...
Lennart Beringer
132
Voted
MOBICOM
1999
ACM
15 years 6 months ago
Optimizing the End-to-End Performance of Reliable Flows Over Wireless Links
We present the results of a performance evaluation of link layer error recovery over wireless links. Our analysis is based upon a case study of the circuit-switched data service i...
Reiner Ludwig, Almudena Konrad, Anthony D. Joseph
127
Voted
VISUALIZATION
1998
IEEE
15 years 6 months ago
Selective visualization of vortices in hydrodynamic flows
Vortices are important features in many research and engineering fields. Visualization is an important step in gaining more understanding and control of vortices. Vortex detection...
I. Ari Sadarjoen, Frits H. Post, Bing Ma, David C....
CASSIS
2005
Springer
15 years 8 months ago
Information Flow Analysis for a Typed Assembly Language with Polymorphic Stacks
Abstract. We study secure information flow in a stack based Typed Assembly Language (TAL). We define a TAL with an execution stack and establish the soundness of its type system ...
Eduardo Bonelli, Adriana B. Compagnoni, Ricardo Me...