Sciweavers

848 search results - page 135 / 170
» Understanding Obfuscated Code
Sort
View
FMOODS
2003
13 years 11 months ago
Managing the Evolution of .NET Programs
Abstract. The component-based model of code execution imposes some requirements on the software components themselves, and at the same time lays some constraints on the modern run-...
Susan Eisenbach, Vladimir Jurisic, Chris Sadler
NIPS
2004
13 years 11 months ago
Assignment of Multiplicative Mixtures in Natural Images
In the analysis of natural images, Gaussian scale mixtures (GSM) have been used to account for the statistics of filter responses, and to inspire hierarchical cortical representat...
Odelia Schwartz, Terrence J. Sejnowski, Peter Daya...
SDL
2001
78views Hardware» more  SDL 2001»
13 years 11 months ago
Using Message Sequence Charts to Accelerate Maintenance of Existing Systems
In this paper we describe our experiences in building tools for accelerating maintenance of existing large telecommunications software. We discuss how various maintenance activitie...
Nikolai Mansurov, Djenana Campara
USITS
2001
13 years 11 months ago
End-to-End WAN Service Availability
Abstract--This paper seeks to understand how network failures affect the availability of service delivery across wide-area networks (WANs) and to evaluate classes of techniques for...
Bharat Chandra, Michael Dahlin, Lei Gao, Amol Naya...
USENIX
2004
13 years 11 months ago
How Xlib Is Implemented (and What We're Doing About It)
The X Window System is the de facto standard graphical environment for Linux and Unix hosts, and is usable on nearly any class of computer one could find today. Its success is par...
Jamey Sharp