Sciweavers

2259 search results - page 148 / 452
» Separation and information hiding
Sort
View
USS
2004
13 years 11 months ago
Static Disassembly of Obfuscated Binaries
Disassembly is the process of recovering a symbolic representation of a program's machine code instructions from its binary representation. Recently, a number of techniques h...
Christopher Krügel, William K. Robertson, Fre...
SSR
1997
98views more  SSR 1997»
13 years 11 months ago
Toward Software Plug-and-Play
The growing size and complexity of systems has revealed many shortcomings of existing software engineering practices, for example, lack of scalability. This in turn raised interes...
François Bronsard, Douglas Bryan, Wojtek Ko...
EPEW
2010
Springer
13 years 11 months ago
Composing Systems While Preserving Probabilities
Abstract. Restricting the power of the schedulers that resolve the nondeterminism in probabilistic concurrent systems has recently drawn the attention of the research community. Th...
Sonja Georgievska, Suzana Andova
CN
2007
106views more  CN 2007»
13 years 10 months ago
MIPv6 experimental evaluation using overlay networks
The commercial deployment of Mobile IPv6 has been hastened by the concepts of Integrated Wireless Networks and Overlay Networks, which are present in the notion of the forthcoming...
Pablo Vidales, Carlos Jesus Bernardos, Ignacio Sot...
COMSUR
2007
101views more  COMSUR 2007»
13 years 10 months ago
A survey of covert channels and countermeasures in computer network protocols
Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorised parties, whereas covert channels aim to ...
Sebastian Zander, Grenville J. Armitage, Philip Br...