Sciweavers

848 search results - page 138 / 170
» Understanding Obfuscated Code
Sort
View
NAR
2006
61views more  NAR 2006»
13 years 9 months ago
NPInter: the noncoding RNAs and protein related biomacromolecules interaction database
The noncoding RNAs and protein related biomacromolecules interaction database (NPInter; http:// bioinfo.ibp.ac.cn/NPInter or http://www.bioinfo.org. cn/NPInter) is a database that...
Tao Wu, Jie Wang, Changning Liu, Yong Zhang, Baoch...
PE
2006
Springer
114views Optimization» more  PE 2006»
13 years 9 months ago
On the performance of Internet worm scanning strategies
In recent years, fast spreading worms, such as Code Red, Slammer, Blaster and Sasser, have become one of the major threats to the security of the Internet. In order to defend agai...
Cliff Changchun Zou, Donald F. Towsley, Weibo Gong
PERVASIVE
2006
Springer
13 years 9 months ago
iCAP: Interactive Prototyping of Context-Aware Applications
Although numerous context-aware applications have been developed and there have been technological advances for acquiring contextual information, it is still difficult to develop a...
Anind K. Dey, Timothy Sohn, Sara Streng, Justin Ko...
IIE
2007
130views more  IIE 2007»
13 years 9 months ago
An Iterative Methodology for Teaching Object Oriented Concepts
Abstract thinking is a vital skill when learning computer science. Object technology and the concepts it is based upon make this skill even more crucial. However, previous research...
Irit Hadar, Ethan Hadar
SIGCSE
2008
ACM
150views Education» more  SIGCSE 2008»
13 years 9 months ago
Backstop: a tool for debugging runtime errors
The errors that Java programmers are likely to encounter can roughly be categorized into three groups: compile-time (semantic and syntactic), logical, and runtime (exceptions). Wh...
Christian Murphy, Eunhee Kim, Gail E. Kaiser, Adam...