Sciweavers

677 search results - page 123 / 136
» Reverse Engineering Super-Repositories
Sort
View
ICFP
2008
ACM
14 years 7 months ago
Report on the tenth ICFP programming contest
The Tenth Annual ICFP Programming Contest was a 72-hour contest held July 20?23 2007 and organised in conjunction with the 12th ACM SIGPLAN International Conference on Functional ...
Alexey Rodriguez, Andres Löh, Arie Middelkoop...
ICFP
2004
ACM
14 years 7 months ago
Searching for deadlocks while debugging concurrent haskell programs
This paper presents an approach to searching for deadlocks in Concurrent Haskell programs. The search is based on a redefinition of the IO monad which allows the reversal of Concu...
Jan Christiansen, Frank Huch
ICCD
2007
IEEE
140views Hardware» more  ICCD 2007»
14 years 4 months ago
A low overhead hardware technique for software integrity and confidentiality
Software integrity and confidentiality play a central role in making embedded computer systems resilient to various malicious actions, such as software attacks; probing and tamper...
Austin Rogers, Milena Milenkovic, Aleksandar Milen...
CVPR
2010
IEEE
14 years 4 months ago
The Role of Features, Algorithms and Data in Visual Recognition
There are many computer vision algorithms developed for visual (scene and object) recognition. Some systems focus on involved learning algorithms, some leverage millions of trainin...
Devi Parikh and C. Lawrence Zitnick
SP
2009
IEEE
130views Security Privacy» more  SP 2009»
14 years 2 months ago
Wirelessly Pickpocketing a Mifare Classic Card
The Mifare Classic is the most widely used contactless smartcard on the market. The stream cipher CRYPTO1 used by the Classic has recently been reverse engineered and serious atta...
Flavio D. Garcia, Peter van Rossum, Roel Verdult, ...