Sciweavers

519 search results - page 28 / 104
» Control flow obfuscation with information flow tracking
Sort
View
SAC
2005
ACM
14 years 2 months ago
Towards the prioritization of regression test suites with data flow information
Regression test prioritization techniques re-order the execution of a test suite in an attempt to ensure that defects are revealed earlier in the test execution phase. In prior wo...
Matthew J. Rummel, Gregory M. Kapfhammer, Andrew T...
VISSYM
2007
13 years 11 months ago
Priority Streamlines: A context-based Visualization of Flow Fields
Flow vector fields contain a wealth of information that needs to be visualized. As an extension of the well-known streamline technique, we have developed a context-based method fo...
Michael Schlemmer, Ingrid Hotz, Bernd Hamann, Flor...
CONEXT
2010
ACM
13 years 7 months ago
Profiling-By-Association: a resilient traffic profiling solution for the internet backbone
Profiling Internet backbone traffic is becoming an increasingly hard problem since users and applications are avoiding detection using traffic obfuscation and encryption. The key ...
Marios Iliofotou, Brian Gallagher, Tina Eliassi-Ra...
EH
2004
IEEE
149views Hardware» more  EH 2004»
14 years 19 days ago
Organization of the Information Flow in the Perception-Action Loop of Evolved Agents
Sensor evolution in nature aims at improving the acquisition of information from the environment and is intimately related with selection pressure towards adaptivity and robustnes...
Alexander S. Klyubin, Daniel Polani, Chrystopher L...
MOBISYS
2003
ACM
14 years 8 months ago
iFlow: Middleware-assisted Rendezvous-based Information Access for Mobile Ad Hoc Applications
Due to node mobility and limitations on bandwidth availability in wireless channels, there exist unique challenges towards achieving efficient and effective information access in ...
Zongpeng Li, Baochun Li, Dongyan Xu, Xin Zhou