Sciweavers

848 search results - page 137 / 170
» Understanding Obfuscated Code
Sort
View
CN
2006
117views more  CN 2006»
13 years 9 months ago
Error resilient image transport in wireless sensor networks
In this paper, we propose an "in-network" diversity combining scheme for image transport over wireless sensor networks. We consider a wireless sensor network with both w...
Huaming Wu, Alhussein A. Abouzeid
ESE
2006
97views Database» more  ESE 2006»
13 years 9 months ago
An empirical study of fine-grained software modifications
Software is typically improved and modified in small increments (we refer to each of these increments as a modification record--MR). MRs are usually stored in a configuration manag...
Daniel M. Germán
ISI
2006
Springer
13 years 9 months ago
A First Look at Domestic and International Global Terrorism Events, 1970-1997
While the study of terrorism has expanded dramatically since the 1970s, most analyses are limited to qualitative case studies or quantitative analyses of international incidents on...
Laura Dugan, Gary LaFree, Heather Fogg
JCT
2006
108views more  JCT 2006»
13 years 9 months ago
Jack van Lint (1932-2004): A survey of his scientific work
When Jack van Lint was appointed as full professor at the Eindhoven University of Technology at the age of 26 he combined a PhD in number theory with a very open scientific mind. ...
Bram Van Asch, Aart Blokhuis, Henk D. L. Hollmann,...
JUCS
2006
92views more  JUCS 2006»
13 years 9 months ago
Program Slicing by Calculation
: Program slicing is a well known family of techniques used to identify code fragments which depend on or are depended upon specific program entities. They are particularly useful ...
Nuno F. Rodrigues, Luís Soares Barbosa