Sciweavers

848 search results - page 52 / 170
» Understanding Obfuscated Code
Sort
View
SAS
2001
Springer
14 years 1 months ago
Using Slicing to Identify Duplication in Source Code
Programs often have a lot of duplicated code, which makes both understanding and maintenance more difficult. This problem can be alleviated by detecting duplicated code, extracting...
Raghavan Komondoor, Susan Horwitz
CRYPTO
1999
Springer
109views Cryptology» more  CRYPTO 1999»
14 years 1 months ago
Coding Constructions for Blacklisting Problems without Computational Assumptions
Abstract. We consider the broadcast exclusion problem: how to transmit a message over a broadcast channel shared by N = 2n users so that all but some specified coalition of k excl...
Ravi Kumar, Sridhar Rajagopalan, Amit Sahai
PASTE
1998
ACM
14 years 1 months ago
OPTVIEW: A New Approach for Examining Optimized Code
The task of mappingbetween source programs and machine code, once the code has been optimizedand transformed by a compiler is often di cult. Yet there are many instances, such as ...
Caroline Tice, Susan L. Graham
CSMR
2004
IEEE
14 years 19 days ago
Source Code Modularization Using Lattice of Concept Slices
Most legacy systems have been altered due to prolonged maintenance to the point that they deviate significantly from their original and intended design and consequently, they lack...
Raihan Al-Ekram, Kostas Kontogiannis
CPHYSICS
2004
89views more  CPHYSICS 2004»
13 years 8 months ago
Comprehensive suite of codes for plasma-edge modelling
The various aspects of plasma-edge physics are included in a comprehensive suite of codes having applications from industrial plasmas to fusion devices. Here the basic ideas, stat...
Ralf Schneider, Xavier Bonnin, Neil McTaggart, Ale...