Sciweavers

533 search results - page 75 / 107
» Control flow based obfuscation
Sort
View
130
Voted
NETWORK
2007
121views more  NETWORK 2007»
15 years 2 months ago
Toward Efficient Service-Level QoS Provisioning in Large-Scale 802.11-Based Networks
Along with recent advances in mobile networking and portable computing technologies, there is a trend in the telecommunications industry toward the development of efficient ubiqui...
Tarik Taleb, Abdelhamid Nafaa, Liam Murphy, Kazuo ...
159
Voted
AOSD
2008
ACM
15 years 4 months ago
AJANA: a general framework for source-code-level interprocedural dataflow analysis of AspectJ software
Aspect-oriented software presents new challenges for the designers of static analyses. Our work aims to establish systematic foundations for dataflow analysis of AspectJ software....
Guoqing Xu, Atanas Rountev
127
Voted
DFG
2003
Springer
15 years 7 months ago
Inter-organizational Business Process Management with XML Nets
Due to the fast growth of internet based electronic business activities, languages for modeling as well as methods for analyzing and executing distributed business processes are be...
Kirsten Lenz, Andreas Oberweis
GLVLSI
2003
IEEE
122views VLSI» more  GLVLSI 2003»
15 years 7 months ago
Cooling of integrated circuits using droplet-based microfluidics
Decreasing feature sizes and increasing package densities are making thermal issues extremely important in IC design. Uneven thermal maps and hot spots in ICs cause physical stres...
Vamsee K. Pamula, Krishnendu Chakrabarty
ETM
2010
257views Economy» more  ETM 2010»
15 years 3 months ago
Implementation and Performance Evaluation of the re-ECN Protocol
Re-inserted ECN (re-ECN) is a proposed TCP/IP extension that informs the routers on a path about the estimated level of congestion. The re-ECN protocol extends the Explicit Congest...
Mirja Kühlewind, Michael Scharf