Sciweavers

848 search results - page 50 / 170
» Understanding Obfuscated Code
Sort
View
CORR
2007
Springer
91views Education» more  CORR 2007»
13 years 9 months ago
Single-Exclusion Number and the Stopping Redundancy of MDS Codes
—For a linear block code C, its stopping redundancy is defined as the smallest number of check nodes in a Tanner graph for C, such that there exist no stopping sets of size smal...
Junsheng Han, Paul H. Siegel, Ron M. Roth
SIGCSE
2009
ACM
150views Education» more  SIGCSE 2009»
14 years 9 months ago
Dereferee: exploring pointer mismanagement in student code
Dynamic memory management and the use of pointers are critical topics in teaching the C++ language. They are also some of the most difficult for students to grasp properly. The re...
Anthony Allevato, Manuel A. Pérez-Qui&ntild...
IMC
2006
ACM
14 years 2 months ago
Finding diversity in remote code injection exploits
Remote code injection exploits inflict a significant societal cost, and an active underground economy has grown up around these continually evolving attacks. We present a method...
Justin Ma, John Dunagan, Helen J. Wang, Stefan Sav...
IUI
2005
ACM
14 years 2 months ago
Metafor: visualizing stories as code
Every program tells a story. Programming, then, is the art of constructing a story about the objects in the program and what they do in various situations. So-called programming l...
Hugo Liu, Henry Lieberman
SOFTVIS
2005
ACM
14 years 2 months ago
CVSscan: visualization of code evolution
During the life cycle of a software system, the source code is changed many times. We study how developers can be enabled to get insight in these changes, in order to understand t...
Lucian Voinea, Alexandru Telea, Jarke J. van Wijk