Sciweavers

677 search results - page 85 / 136
» Reverse Engineering
Sort
View
ISW
2004
Springer
14 years 1 months ago
The Obfuscation Executive
Abstract. Code obfuscations are semantics-preserving code transformations used to protect a program from reverse engineering. There is generally no expectation of complete, long-te...
Kelly Heffner, Christian S. Collberg
FUN
2010
Springer
306views Algorithms» more  FUN 2010»
14 years 20 days ago
Leveling-Up in Heroes of Might and Magic III
We propose a model for level-ups in Heroes of Might and Magic III, and give an O 1 ε2 ln 1 δ learning algorithm to estimate the probabilities of secondary skills induced by any ...
Dimitrios I. Diochnos
FPL
2001
Springer
92views Hardware» more  FPL 2001»
14 years 10 days ago
Secure Configuration of Field Programmable Gate Arrays
Although SRAM programmed Field Programmable Gate Arrays (FPGA's) have come to dominate the industry due to their density and performance advantages over non-volatile technolog...
Tom Kean
DL
2000
Springer
156views Digital Library» more  DL 2000»
14 years 6 days ago
Re-engineering structures from Web documents
To realise a wide range of applications (including digital libraries) on the Web, a more structured way of accessing the Web is required and such requirement can be facilitated by...
Chuang-Hue Moh, Ee-Peng Lim, Wee Keong Ng
EICS
2010
ACM
14 years 6 days ago
User interface model discovery: towards a generic approach
UI model discovery is a lightweight formal method in which a model of an interactive system is automatically discovered by exploring the system’s state space, simulating the act...
Andy Gimblett, Harold W. Thimbleby