Sciweavers

761 search results - page 96 / 153
» Reverse engineering MAC
Sort
View
JPDC
2006
83views more  JPDC 2006»
13 years 8 months ago
Virtual Leashing: Creating a computational foundation for software protection
We introduce Virtual Leashing,1 a new technique for software protection and control. The leashing process removes small fragments of code, pervasive throughout the application, an...
Ori Dvir, Maurice Herlihy, Nir Shavit
INFSOF
2007
185views more  INFSOF 2007»
13 years 8 months ago
Evaluation of object-oriented design patterns in game development
The use of object-oriented design patterns in game development is being evaluated in this paper. Games’ quick evolution, demands great flexibility, code reusability and low mai...
Apostolos Ampatzoglou, Alexander Chatzigeorgiou
JBI
2007
138views Bioinformatics» more  JBI 2007»
13 years 8 months ago
Towards knowledge-based gene expression data mining
ct 10 The field of gene expression data analysis has grown in the past few years from being purely data-centric to integrative, aiming at 11 complementing microarray analysis with...
Riccardo Bellazzi, Blaz Zupan
JUCS
2007
80views more  JUCS 2007»
13 years 8 months ago
Higher-Order Lazy Functional Slicing
: Program slicing is a well known family of techniques intended to identify and isolate code fragments which depend on, or are depended upon, specific program entities. This is pa...
Nuno F. Rodrigues, Luís Soares Barbosa
ACTAC
2002
102views more  ACTAC 2002»
13 years 8 months ago
Handling Pointers and Unstructured Statements in the Forward Computed Dynamic Slice Algorithm
Different program slicing methods are used for debugging, testing, reverse engineering and maintenance. Slicing algorithms can be classified as a static slicing or dynamic slicing...
Csaba Faragó, Tamás Gergely