Sciweavers

1805 search results - page 94 / 361
» Understanding Code Mobility
Sort
View
IWPC
2009
IEEE
15 years 8 months ago
The effectiveness of source code obfuscation: An experimental assessment
Source code obfuscation is a protection mechanism widely used to limit the possibility of malicious reverse engineering or attack activities on a software system. Although several...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...
ESSOS
2009
Springer
15 years 6 months ago
Idea: Measuring the Effect of Code Complexity on Static Analysis Results
Abstract. To understand the effect of code complexity on static analysis, thirty-five format string vulnerabilities were studied. We analyzed two code samples for each vulnerabilit...
James Walden, Adam Messer, Alex Kuhl
IFIP
2004
Springer
15 years 7 months ago
Behavioural Equivalences for Dynamic Web Data
Peer-to-peer systems, exchanging dynamic documents through Web services, are a simple and effective platform for data integration on the internet. Dynamic documents can contain b...
Sergio Maffeis, Philippa Gardner
BCSHCI
2007
15 years 3 months ago
Visualising Bluetooth interactions: combining the Arc diagram and DocuBurst techniques
Within the Bluetooth mobile space, overwhelmingly large sets of interaction and encounter data can very quickly be accumulated. This presents a challenge to gaining an understandi...
Daragh Byrne, Barry Lavelle, Gareth J. F. Jones, A...
CHI
2007
ACM
16 years 2 months ago
Computer aided observations of complex mobile situations
Designing mobile and wearable applications is a challenge. The context of use is more important than ever and traditional methodologies for elicitation and specification reach the...
Tobias Klug