Sciweavers

519 search results - page 64 / 104
» Control flow obfuscation with information flow tracking
Sort
View
CC
2008
Springer
138views System Software» more  CC 2008»
13 years 10 months ago
Improved Memory-Access Analysis for x86 Executables
Over the last seven years, we have developed static-analysis methods to recover a good approximation to the variables and dynamically allocated memory objects of a stripped executa...
Thomas W. Reps, Gogul Balakrishnan
ACSAC
2004
IEEE
14 years 17 days ago
Security Policies to Mitigate Insider Threat in the Document Control Domain
With rapid advances in online technologies, organizations are migrating from paper based resources to digital documents to achieve high responsiveness and ease of management. Thes...
Suranjan Pramanik, Vidyaraman Sankaranarayanan, Sh...
CAISE
2006
Springer
14 years 17 days ago
Integration of heterogeneous BPM Schemas: The Case of XPDL and BPEL
Heterogeneous Business Process Modeling (BPM) schemas have been a problem for business process management throughout the last couple of years. Although there are several standardiz...
Thomas Hornung, Agnes Koschmider, Jan Mendling
WWW
2003
ACM
14 years 9 months ago
Monitoring the dynamic web to respond to continuous queries
Continuous queries are queries for which responses given to users must be continuously updated, as the sources of interest get updated. Such queries occur, for instance, during on...
Sandeep Pandey, Krithi Ramamritham, Soumen Chakrab...
AVI
2006
13 years 10 months ago
Evaluating the effects of fluid interface components on tabletop collaboration
Tabletop displays provide exciting opportunities to support individual and collaborative activities such as planning, organizing, and storyboarding. It has been previously suggest...
Uta Hinrichs, M. Sheelagh T. Carpendale, Stacey D....