Sciweavers

726 search results - page 124 / 146
» Reverse engineering: a roadmap
Sort
View
ACSC
2006
IEEE
14 years 3 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson
SP
2006
IEEE
193views Security Privacy» more  SP 2006»
14 years 3 months ago
Analysis of the Linux Random Number Generator
Linux is the most popular open source project. The Linux random number generator is part of the kernel of all Linux distributions and is based on generating randomness from entrop...
Zvi Gutterman, Benny Pinkas, Tzachy Reinman
ISMAR
2005
IEEE
14 years 3 months ago
The Art of Nurturing Citizen Scientists through Mixed Reality
Modern society requires the public to have an increased knowledge of science beyond the basics, with average people needing to understand concepts in science, technology, engineer...
Christopher B. Stapleton, Eileen M. Smith, Charles...
CAISE
2005
Springer
14 years 3 months ago
A MDA-Compliant Environment for Developing User Interfaces of Information Systems
Abstract. To cope with the ever increasing diversity of markup languages, programming languages, tool kits and interface development environments, conceptual modeling of user inter...
Jean Vanderdonckt
SIGADA
2005
Springer
14 years 3 months ago
Data sharing between ada and C/C++
The En Route Automation Modernization (ERAM) program is a real-time Air Traffic Control (ATC) program being developed by Lockheed Martin Corporation. The ERAM program has high ava...
Matt Mark